Protecting ICT systems

?
copies itself within a system and causes damage to data and destroys computer files
Virus
1 of 8
a piece of software designed to affect or damage a computer system
Malware
2 of 8
allows users to gather information without being detected from another users computer
Spyware
3 of 8
a type of security software that prevents a system from being hacked
Firewall
4 of 8
a piece of software designed to detect and remove viruses
Virus checker
5 of 8
copies of data and files to prevent the loss of data if the original is damaged
Backup
6 of 8
a form of data security. ensures data cannot be accessed without a password.
Encryption
7 of 8
permission which is given to a user or to an application to read and edit files on a computer
Access rights
8 of 8

Other cards in this set

Card 2

Front

a piece of software designed to affect or damage a computer system

Back

Malware

Card 3

Front

allows users to gather information without being detected from another users computer

Back

Preview of the front of card 3

Card 4

Front

a type of security software that prevents a system from being hacked

Back

Preview of the front of card 4

Card 5

Front

a piece of software designed to detect and remove viruses

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »