click below
click below
Normal Size Small Size show me how
J277 1.4.2
Identifying and preventing vulnerabilities
| Term | Definition |
|---|---|
| Authentication | Can confirm the identity of a user before they're allowed to access certain pieces of data or features of the program. |
| Patch | An update designed to make something better or more secure |
| Privacy | Keeping things secret from others |
| Encryption | The purpose of scrambling data so it can be sent securely over networks and requires a key to read the data |
| Anti–Malware | Software designed to find and quarantine or remove malware |
| Physical Security | Using physical methods to protect data e.g. locks, biometrics etc |
| Penetration testing | A method of assessing the security of a system by simulating real–world attacks |
| User Access Levels | Protecting a system by setting level of permissions and privileges granted to users |
| Firewall | Blocks unauthorised access by scanning all data packets entering and leaving the network |