The process of coding files before they are sent over a network to protect them from hackers. Can also be done to saved files to prevent them being understood if they are stolen.
Encryption
1 of 16
A piece of software, hardware or both that is able to protect a network from hackers.
Firewall
2 of 16
A series of characters chosen by the user that are used to check the identity of the user to allow them access to the computer system or network.
Password
3 of 16
A name or number that is used to identify a certain user of a network or system.
User ID
4 of 16
The person who holds responsibility of controlling how the organisation processes personal data.
Data Controller
5 of 16
The living individual that the personal information is about.
Data Subject
6 of 16
The person responsible for enforcing the data protection act 1998.
Information commissioner
7 of 16
Data about a living person which is specific to that person
Personal data
8 of 16
The process of letting the Information Commissioner's Office know that personal data is being processed.
Notification
9 of 16
The process of illegally processing software.
Piracy
10 of 16
A document which sets out the terms by which the software can be used, this is how many computers the software can be run on simultaneously.
Software Licence
11 of 16
Copies of software and data so that if this is lost on the original computer system it can be recovered.
Backup
12 of 16
Crimes committed with an ICT system as its major part.
Cybercrime
13 of 16
Unsolicited bulk email, ie emails from people you do not know sent to masses of people in the hope it is successful.
Spam
14 of 16
setting up bogus companies with bogus websites and then tricking people into giving them their money.
Scam
15 of 16
A measure of the amount of data that can be transferred using a data transfer medium.
Bandwidth
16 of 16
Other cards in this set
Card 2
Front
A piece of software, hardware or both that is able to protect a network from hackers.
Back
Firewall
Card 3
Front
A series of characters chosen by the user that are used to check the identity of the user to allow them access to the computer system or network.
Back
Card 4
Front
A name or number that is used to identify a certain user of a network or system.
Back
Card 5
Front
The person who holds responsibility of controlling how the organisation processes personal data.
Comments
No comments have yet been made