A person who tries to or succeeds in breaking into a secure computer system
1 of 10
Hacking
The process of trying to break into a secure computer system
2 of 10
UPS
Uninterruptible Power Supply - a backup power supply (generator and battery) which will keep the computer running should the mains power supply fail
3 of 10
Password
A series of characters chosen by the user that are used to check the identity of the user when they require access to an ICT system
4 of 10
User ID
A name or number that is used to identify a certain user of the network or system
5 of 10
Firewall
A piece of software, hardware or both that is able to protect a network from hackers
6 of 10
Backup
Copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system
7 of 10
Encryption
The process of coding files before they are sent over a network to protect them from hackers. Also the process of coding files stored on a computer so that if the computer is stolen, they cannot be read.
8 of 10
Risk Analysis
The process of assessing the likelihood of certain events happening and estimating the cost of the damage they could cause and what can be done at reasonable cost to eliminate or minimise the risk
9 of 10
Disaster Recovery Programme
A plan that restores ICT facilites in as short a time as possible in order to minimise the loss caused bt the complete or partial loss of an organisation's ICT facilities
10 of 10
Other cards in this set
Card 2
Front
The process of trying to break into a secure computer system
Back
Hacking
Card 3
Front
Uninterruptible Power Supply - a backup power supply (generator and battery) which will keep the computer running should the mains power supply fail
Back
Card 4
Front
A series of characters chosen by the user that are used to check the identity of the user when they require access to an ICT system
Back
Card 5
Front
A name or number that is used to identify a certain user of the network or system
Comments
No comments have yet been made