LO3

?
  • Created by: Edanxx
  • Created on: 01-04-21 10:44
Access Management
Managing the access to a computer system or network.
1 of 18
Account lockout
A software security method performed by operating system software that locks any account when a user fails a login attempt more than a set number of times.
2 of 18
Anti-malware
Software designed to prevent, detect and eradicate malicious software, such as a virus or a worm.
3 of 18
Anomaly Based
Software that is designed to detect computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous.
4 of 18
Assest
Something that is of value to a person, an organisation or a state, e.g. data, finance and secrets that should be secured against cyber security incidents.
5 of 18
Attacker
Individuals or organisations that target computer systems or network illegally.
6 of 18
Audit Trail
A record of activities on a computer system or network, for example, a record of modifications to data or access to parts of a system or network.
7 of 18
Availability
Data or information stored on a computer system or network must be available to authorised users and organisations and be protected.
8 of 18
Biometric access
Access to a computer system or network using technologies that use unique human characteristics (such as iris or fingerprint) for authentication purposes.
9 of 18
Botnet
A network of computers infected with malicious software and controlled without the owners’ knowledge, for example, to send spam or hoax emails.
10 of 18
Business continuity plan
A plan to continue operations that an organisation will follow if it is affected by a cyber security incident
11 of 18
Confidentiality
Information stored on a computer system or network must be protected against unintended or unauthorised access
12 of 18
Cyber criminal
An individual who commits illegal activities using computers and the Internet.
13 of 18
Cyber dependant
Illegal activities dependent on the use of computers and the Internet, such as hacking or the distribution of malware on a network.
14 of 18
Cyber enabled
Illegal activities that could be undertaken without the use of computers, such as fraud but that are enabled by the use of computers, such as fraudulently obtaining money for goods online.
15 of 18
Cyber security
Refers to technologies, processes and practices designed to protect computers, networks, software and data from attack, damage or unauthorised access and aims to protect data confidentiality, integrity and availability.
16 of 18
Cyber Security incidents
It is an unwanted or unexpected event such as an intrusion of a system or network, such as the spread of a malware.
17 of 18
Cyber Security Incident Report
This is a report that documents the information and details of a cyber security incident (Data, where it occurred, what happened etc.)
18 of 18

Other cards in this set

Card 2

Front

A software security method performed by operating system software that locks any account when a user fails a login attempt more than a set number of times.

Back

Account lockout

Card 3

Front

Software designed to prevent, detect and eradicate malicious software, such as a virus or a worm.

Back

Preview of the back of card 3

Card 4

Front

Software that is designed to detect computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous.

Back

Preview of the back of card 4

Card 5

Front

Something that is of value to a person, an organisation or a state, e.g. data, finance and secrets that should be secured against cyber security incidents.

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Cyber Security resources »