6. Databases and Storage, Online Threats and Legislation,

Description

Terms about Databases, Malware and Hacking stuff.
Daf (murrayd17)
Flashcards by Daf (murrayd17), updated more than 1 year ago
Daf (murrayd17)
Created by Daf (murrayd17) over 8 years ago
14
0

Resource summary

Question Answer
Cloud computing This is when a computer uses services provided by another organisation’s computer systems.
Ubiquitous Computing The growing trend towards embedding microprocessors in everyday objects so they can communicate information. The words pervasive and ubiquitous mean "existing everywhere."
RFID - Radio Frequency IDentification A data collection technology that uses electronic tags for storing and monitoring data. Used for security.
Cloud storage This is when a computer’s storage, access and retrieval facilities are hosted by another computer system.
Databases A collection of information that is organized so that it can easily be accessed, managed, and updated.
Table A two-dimensional representation of data in a database.
Record A group of selected data which are associated in some way.
Field A single piece of data within a record.
Primary Key A single unique key used to identify each record in a table.
Foreign Key A field which can be used to cross-reference and access associated information across many tables.
Boolian Yes or No.
SQL - Structured Query Language A special-purpose programming language designed for managing data held in a DBMS, or for stream processing in a relational data stream management system (RDSMS).
DDL - Data Definition Language A standard for commands that define the different structures in a database. DDL statements create, modify, and remove database objects such as tables, indexes, and users.
DML - Data Manipulation Language The software that allows you to create a Database. Used to retrieve, store, edit, delete, insert and update data in database.
DBMS - Database Management System A computer software application that interacts with the user, other applications, and the database itself to capture and analyse data. A general-purpose DBMS is designed to allow the definition, creation, querying, update, and administration of databases.
Hack To illegally gain unauthorized access to data in a system or computer.
Identity Theft When someone steals your personal details in order to use them to open bank accounts and get credit cards, loans, a passport or a driving licence in your name.
Opportunist A person who takes advantage of opportunities as and when they arise, regardless of planning or principle. In terms of internet technology an online opportunist uses various methods to fool and take advantage of users. They find an unattended computer which has been left logged in to a system may view, steal or damage information, programs or even hardware.
Virus A piece of computer code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Malware - Malicious Software A hostile, intrusive or annoying piece of software or program code.
Trojan A serious form of computer malware which infects software with virus's. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
Phishing The fraudulent practice of attempting to gain access to passwords, financial details and other such privileged information by sending false emails.
Password Control A string of characters that allows access to a computer, interface, or system.
Access Levels These can be set by Network managers to allow individuals access to various files in a the network.
Anti Virus Software Sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Firewall Security Software which protects a network or system from unauthorized access with a firewall.
Encryption The most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
Accidental Damage This may be caused by a natural disaster ,such as flooding, mischief or accidental mishap, and can result in losing all of a computer’s data.
Physical Barriers In this instance, Something physical that attempts to stop data from being stolen. Examples of this are Security Guards, Locked Doors, ID's, safes etc.
Legislation laws, considered collectively.
Copyright, Designs and Patents Act 1988 The current UK copyright law. It gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used.
Computer Misuse Act 1990 Enables hackers to be prosecuted under the law. It recognised the following new offences: 1.Unauthorised access to computer material . 2.Unauthorised access with intent to commit or facilitate a crime. 3.Unauthorised modification of computer material. 4. Making, supplying or obtaining anything which can be used in computer misuse offences.
Data Protection Act 1998 An Act of Parliament of the United Kingdom of Great Britain and Northern Ireland which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the protection of personal data in the UK.
8 Principles of the Data Protection Act
Freedom Of Information Act 2000 Provides public access to information held by public authorities. It does this in two ways: public authorities are obliged to publish certain information about their activities; and. members of the public are entitled to request information from public authorities.
Show full summary Hide full summary

Similar

System Life Cycle
Alfie Mann
System Life Cycle
Curtis Garrett
The Digestive System
cian.buckley
Segunda Guerra Mundial 1939-1945
miminoma
Breaking Bad
PatrickNoonan
GCSE PE - 1
lydia_ward
Fractions and percentages
Bob Read
SAT Exam 'Word of the Day' Set 2
SAT Prep Group
IGCSE Physics formulas
Imani :D
Evolution
rebeccachelsea
TISSUE TYPES
Missi Shoup