Topic 5.1 Keywords Flashcards

1
Q

audit trail

A

a record of activities that have taken place on a computer system. this record is generated automatically and will record what has happened and who or what made the change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

authentication

A

the process of proving to a computer system who you are (eg. username and password).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

back-up

A

a copy of files in another location so that they are still available if the original copy is damaged or lost. backing up is the process of making a back-up copy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

bandwidth

A

the amount of data that can be carried on a network in a given period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

byte

A

the basic combination of bits used to represent an item of information. a byte consists of 8 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

checksum

A

an error detection technique. a mathematical formula is applied to the data and the resulting numerical value is transmitted with the data. the recipient computer applies the same formula to the received data and then compares the checksum sent with the data to the calculated checksum. if the checksums don’t match, the data is likely to have been corrupted and the recipient computer requests the data again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

client-sever network

A

a network that has at least one server to provide services to the client computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cloud storage

A

secondary storage, often belonging to a third party, that is accessed via a network, usually the internet, and so is not in the same physical place as the machine’s RAM/ROM. files stored “in the cloud” can be accessed from anywhere via an internet connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

code vulnerability

A

a computer program (the code) that has been written in such a way that it creates a security issue that may be taken advantage of to gain access to the computer system or data within it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

communication media

A

the means by which data is transmitted between devices on a network. coaxial cable, fibre-optic cable and microwaves are all forms of communication media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cyberattack

A

any kind of malicious attack on a network-connected device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

denial of service (DoS)

A

an attack on a network that attempts to prevent legitimate users from accessing its services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

eavesdrop

A

having unauthorised sight of data being sent from ione computer to another over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

encryption

A

the process of encoding a message into a form that only the intended recipient can decode, or decrypt, and read. the message is encoded using an agreed method or algorithm. this is called the key. the encrypted message is called the cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

firewall

A

a utility that controls program access to the network both incoming and outgoing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

hypertext markup language (HTML)

A

essentially a text document that contains any text to be displayed along with:

  • details of how text should be formatted
  • details of any hyperlinks and when they like to using a URL.
  • details of any object such as pictures or videos that should be shown within the web page when it is displayed
17
Q

identity theft

A

the stealing of another persons personal details such as their bank account number, sort code or passport number, for the purpose of making purchases and running up debts in their name

18
Q

internet

A

a worldwide system of interconnected networks that enables information to be exchanged and shared

19
Q

internet service provider (ISP)

A

an organisation that provides its customers with a connection to the internet.

20
Q

local area network (LAN)

A

a network that covers a relatively small geographical area, often a single site

21
Q

malware

A

short for “malicious software”. it is used as a generic term for any kind of software that is designed to disrupt the use of a computer system

22
Q

network

A

an arrangement of computers and other devices connect together to share resources and data.

23
Q

netowork topology

A

describes how the devices on a network are connected together

24
Q

network security

A

activities designed to protect network and its data form threats such as viruses, hacker attacks, denial of service attacks data interception and theft, and equipment failure.

25
Q

packet

A

a small quantity of data being sent through a network. the packet is labelled with the sender address (source), the recipient (destination), how many packets are being transmitted and the position of this packet in the complete message

26
Q

peer-to-peer network

A

a network that doesn’t have any centralised servers. each computer in the network can act as client and server

27
Q

phishing

A

attempting to get confidential information by sending a user a message that appears to come from a trustworthy person or organisation

28
Q

physical securtiy

A

controlling access to critical parts of a network using physical methods (locked doors) rather than software

29
Q

protocol

A

a set of rules that govern how communications on a network should be formatted and what data they should include

30
Q

router

A

a piece of networking hardware used to forward packets of data from one network to another

31
Q

shoulder surfing

A

gainng access to information by watching someone enter it into a computer system

32
Q

social engineering

A

any kind of attack on a computer system or network that exploits how people behave andrespond to certain situations

33
Q

spyware

A

software, possibly a virus, that is designed to be installed secretly on a computer and record private information as the user enters it

34
Q

unpatched software

A

software that hasn’t had the latest security updates applied to it, making it vulnerable to attack

35
Q

web server

A

powerful computer systems that store web pages and any multimedia that the pages might contain

36
Q

wide area network (WAN)

A

a network that covers a large geographical area. it connect together two or LANs and is usually under collective ownership. the largest wide area network is the internet.

37
Q

wireless local area network

A

a local area network in which connected devices use high frequency radio waves to communicate

38
Q

hacking

A

the act of gaining unauthorised access to a computer system and the data it contains

39
Q

virus

A

software that is designed to make and distribute copies of itself, usually for malicious purpose