Information Technology

Cards (48)

  • Computer security

    Concepts related to identifying, assessing and managing attacks on a computer system
  • Cybersecurity
    Concepts related to identifying, assessing and managing attacks on a computer system
  • Computer abuse is any activity during which a computer system or its data is accessed, modified or denied without proper authorization
  • Cyberspace
    Any data or resource that can be accessed via a computer or the internet
  • Cyberspace
    • Youtube
    • Tik Tok App
    • Phone App
  • Cybercrime is any crime perpetrated using computers and computer systems, e.g. piracy, ransomware
  • Cybersecurity involves identifying, assessing and managing attacks on computer systems
  • Chapter 4: Social and Economic impact of information and communication technology
    12-04-84
  • Computer security

    All the activities related to identifying, assessing and managing threats to a computer system
  • Computer misuse
    Any activity during which a computer system or computer data is accessed or its data is accessed, modified or deleted without proper authorization
  • Cyberspace
    Any data or resource that can be accessed via a computer network
  • Examples of cyberspace

    • Youtube
    • Tik Tok App
    • Phone App
  • Cybercrime
    Any crime perpetrated using computers and networks
  • Examples of cybercrime

    • Economic espionage
    • Ransomware
  • Cybersecurity
    All activities related to identifying, assessing and managing the vulnerabilities, threats and attacks from cyberspace
  • Firewall
    Monitors a network, blocking dangerous content
  • Firewall
    • Can be a physical device attached to a network or software running on a connected computer
  • Vulnerability
    Exposure to the possibility of being attacked
  • Threat
    A statement of an intention to inflict harm or damage
  • Countermeasure
    An action taken to counteract a threat
  • Examples of computer misuse by individuals
    • Using work computers for personal browsing during work hours
  • Examples of computer misuse by organizations

    • Industrial espionage
    • Unauthorized accessing of a competitor's computer systems to obtain confidential data
  • Examples of computer misuse by governments
    • Intercepting private emails
  • Cyberbullying
    A form of bullying or harassment using computer-based communications to post, send or share negative, harmful, false or mean content about someone else, causing embarrassment or humiliation
  • Identity theft

    The deliberate use of someone else's personal information, usually to gain a financial advantage
  • Examples of identity theft

    • Obtaining loans and credit cards
    • Fraudulent withdrawals from bank accounts
    • Fraudulent use of identity documents
  • Indecent material

    Material of a sexual nature or that offends against society's morality, which can lead to emotional distress of the victim and the perpetrator may lose their job and be subject to prosecution
  • Phishing
    The attempt to obtain sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication
  • Privacy
    The right of an individual to choose freely under what circumstances and to what extent they will reveal information about themselves
  • Personal data

    Information such as name, address, date of birth
  • Privacy violation

    The act of sharing any of the above personal data without the individual's consent
  • Cookie
    A piece of data set from a website and stored on the user's computer by the user's web browser while the user is browsing
  • Copyright
    A legal right that gives the creator of an original work exclusive rights over its use and distribution
  • Copyright infringement

    Reproducing, creating a derivative work, distributing, performing or otherwise benefiting from the copyright without obtaining the requisite permissions
  • One effect of copyright infringement is the loss of revenue for the rights holder
  • Software piracy

    The unauthorized reproduction, distribution or use of software products
  • Data theft

    The unauthorized access and theft of data
  • Denial-of-service (DOS) attack

    A cyber-attack where the intent is to prevent a Service being delivered by the target system
  • Distributed denial-of-service (DDOS) attack

    A cyber-attack during which the target system is flooded with requests that overload the target system
  • DDOS attack

    Can cause businesses to lose revenue and customers may decide to switch to a more reliable alternative