Topic 5.1 Keywords Flashcards
audit trail
a record of activities that have taken place on a computer system. this record is generated automatically and will record what has happened and who or what made the change.
authentication
the process of proving to a computer system who you are (eg. username and password).
back-up
a copy of files in another location so that they are still available if the original copy is damaged or lost. backing up is the process of making a back-up copy.
bandwidth
the amount of data that can be carried on a network in a given period of time.
byte
the basic combination of bits used to represent an item of information. a byte consists of 8 bits.
checksum
an error detection technique. a mathematical formula is applied to the data and the resulting numerical value is transmitted with the data. the recipient computer applies the same formula to the received data and then compares the checksum sent with the data to the calculated checksum. if the checksums don’t match, the data is likely to have been corrupted and the recipient computer requests the data again.
client-sever network
a network that has at least one server to provide services to the client computers.
cloud storage
secondary storage, often belonging to a third party, that is accessed via a network, usually the internet, and so is not in the same physical place as the machine’s RAM/ROM. files stored “in the cloud” can be accessed from anywhere via an internet connection.
code vulnerability
a computer program (the code) that has been written in such a way that it creates a security issue that may be taken advantage of to gain access to the computer system or data within it.
communication media
the means by which data is transmitted between devices on a network. coaxial cable, fibre-optic cable and microwaves are all forms of communication media.
cyberattack
any kind of malicious attack on a network-connected device
denial of service (DoS)
an attack on a network that attempts to prevent legitimate users from accessing its services
eavesdrop
having unauthorised sight of data being sent from ione computer to another over a network
encryption
the process of encoding a message into a form that only the intended recipient can decode, or decrypt, and read. the message is encoded using an agreed method or algorithm. this is called the key. the encrypted message is called the cipher.
firewall
a utility that controls program access to the network both incoming and outgoing