click to edit title
Hacking Gaining unauthorised access to a computer with the intention of corrupting
or stealing data.
Data Theft Stealing digital information stored on computers or electronic devices to
obtain confidential information.
click to edit
Malware Malware is short for Malicious Software designed to cause harm to a
computer system. It is usually downloaded onto a computer unintentionally by
using the internet or from email attachments.
Examples include:
- Virus
- Worm
- Trojan Horse
- Spyware
Spamming Sending ‘junk’ emails, e.g. adverts for products; as a result, the inbox
becomes overloaded and time is wasted opening and reading such emails.
Phishing Sending emails that appear to be from a reliable source; these emails often
ask the recipient to update their personal information by clicking a hyperlink.
Phishing Sending emails that appear to be from a reliable source; these emails often
ask the recipient to update their personal information by clicking a hyperlink.
click to edit
Password A unique code that enables a user to log on to a certain file.
It should be at least 8 characters long and a mixture of numbers, uppercase
and lowercase letters and other symbols.
click to edit
Encryption This is the encoding of data before transmission and the decoding of the
data at destination. Data is meaningless if intercepted. Data can only be
decrypted using a key.
click to edit
Virus
Protection
Software used to protect the computer system from all forms of viruses
protects data from unauthorised access and corruption (from malicious
sources)
Firewall A software program monitors incoming and outgoing data. It prevents data
being hacked or unauthorised users from entering the network.
click to edit
Data Back
Up
To make a copy of data
If data is lost the system must have some method of recovering the data
there is a copy of the data that can be loaded on to the system if the
original data is lost. Backup copies of data are stored on a variety of media.