Level 51 Level 53
Level 52

Data Protection Issues


10 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?
data threats
accidental or malicious damage from hackers, viruses, hardware breakdown, or human error
data security
protection of data against accidental and deliberate damage
off site storage
regular backup of data and storing in a secure location away from the main source
hacking
unauthorized access to data with the intent of altering, deleting, or copying the data without permission
biometric scans
physical characteristics to restrict access to the data
password hierarchy
use of different levels of security to limit access to files
Firewall
(computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers
transaction log
a history of the logins and actions that have occurred over a period of time
encrypt
changing data so that it is meaningless to someone who does not possess the decryption key
access rights
file settings that allow users to have varying control of a file; view and alter, view only, or no access at all.