Security and Data Management Flashcards
(3 cards)
Suitable passwords
Different programs may require a user to use different
complexities of password, as well as different character lengths. An example of a simple
password may be the user’s town of birth, or the word ‘password’
User access levels
User access levels are one method used to allow certain users read and/or write
access to data on a computer system. For example, in a program used within a company, an
administrator, possibly the owner, will have read and write access to all data on the system
Encryption techniques
Encryption is the conversion of data, using an algorithm, into a form, called cyphertext that
cannot be easily understood by people without the decryption key.
When data is encrypted, a logical operator is sometimes used, called the XOR logical
operator