Study sets, textbooks, questions
Upgrade to remove ads
Cambridge Technicals IT Level 3 - Unit 1 - LO5
Terms in this set (27)
Any software that prevents unwanted access to a computer system.
The measurement and statistical analysis of a person's physical and behavioural characteristics.
Black Hat Hacker
This is a person who hacks for personal gain. This could be for money or other thing.
Can hopefully identify anyone breaking in and to be able to then arrest them
The systematic approach to dealing with change from the perspective of an organisation and individals
Cross-cut shredders are the most effective as they shred paper into small squares and are therefore more secure.
The theft of data from a computer system or data intercepted during transmission across a network.
Unauthorised real-time interception of a private communication. e.g. phone call, IM etc.
Transformation of information into a format that is unintelligible to anyone who does not have the correct key
Controls what comes in and out of the computer system.
Grey Hat Hacker
This is a person who hacks into a system without malicious intent however they dont have legal permission to do so. This means that it is illigal.
V V V Bad Man
Health and Safety
Maintaining the health, safety and welfare of employees and, if appropriate, visitors to the premises
Being able to work without the control or influence of others
Can be used to PHYSICALLY protect infomation from people.
Being able to do what is required without influence from others
A WOrd To GiVe yOU acCESs TO sOmEtHing. SucH aS LeTtIng yOu PaSs.
Where a peson is contacted by someone posing as a legitmate organsiation to encourage them to give sensitive information
Blocks visibility when the display is viewed from a side angle.
Chip inside the ID badge contains information that is communicated to the scanner.
Strip-cut shredders shred the paper into parallel lengths.
Can be in the form of a smartcard or key fob.
Hides within what appears to be a harmless program or will trick a person into installin git, it will take over the system and lock the user out
Use of Information
How personal information is gathered, stored, processed, used and disseminated
A program that replicates its self as to spread to other computers. It will also attempt to harm a computer.
A current or past employee that reports the misconduct of an organisation. it could be something from the past or ongoing for the future
White Hat Hacker
Known as ethical, only seek vulnerabilities when they are legally permitted to do so
Sets with similar terms
IS 3003 Ch 8: Securing Information Systems
HITT Chapter 10
Sets found in the same folder
Cambridge Technicals IT Level 3 - Unit 1 - LO4
Cambridge Technicals IT Level 3 - Unit 1 - LO2
Cambridge Technicals IT Level 3 - Unit 1 - LO1
Cambridge Technicals IT Level 3 - Unit 1 - LO3
Other sets by this creator
Python Math (**,%,//)
1.7 Systems Software
ALEVEL ICT UNIT 2: Stages of Data Analysis
Year 10 Assessment 2 Revision
What is white-collar crime?
Your daily life includes many social networks, or groups that regularly contribute to your socialization. They include family, friends, teachers, people at work, teammates, and so forth. Identify one of these groups, and imagine your day if you suddenly lost contact with those people. What support would be missing? What key elements are provided by this particular social network?
Your high school has in-groups and out-groups. Concentrate on two of these groups and analyze sociologically the differences in the roles of group membership in one in-group and one out-group.
Describe an experience you have had with the looking-glass process. How did this experience touch or change your self-concept?
Recommended textbook solutions
Anderson's Business Law and the Legal Environment, Comprehensive Volume
David Twomey, Marianne Jennings, Stephanie Greene
Information Technology Project Management: Providing Measurable Organizational Value
Jack T. Marchewka
Operations Management: Sustainability and Supply Chain Management
Barry Render, Chuck Munson, Jay Heizer
Other Quizlet sets
Biochem Study questions and notes Midterm 2
Pharm Test 3
ECON 167; Midterm 2 :)
Operating Systems Chapter 6 Review EX2
A technician is configuring rights and permissions in Windows 7. Which tool will the technician use?
Quint argues that those favoring divestment regarding South African apartheid framed the issue as being an urgent question of
Is transnational contention a threat to the sovereignty of nation-states?
Is dumpster diving passive or active reconnaissance?