Game Preview

Unit 14 - Software development - Vocabulary Revi ...

  •  English    35     Public
    Read the definitions and guess the word or Read the word and summarize the definition in your own words.
  •   Study   Slideshow
  • A type of malware that infects files or systems by attaching itself to a legitimate program, spreading when the program is executed.
    Virus
  •  10
  • The specific needs and measures that must be taken to protect systems, data, and networks from unauthorized access or threats
    Security Requirements
  •  10
  • Password Protection
    Methods and technologies used to secure passwords from unauthorized access, including encryption and strong password policies
  •  15
  • A set of rules and guidelines that define how an organization manages, protects, and handles sensitive information and resources.
    Security Policy
  •  10
  • Desktop Computer Security
    Measures taken to protect desktop computers from threats such as unauthorized access, malware, and data loss.
  •  15
  • Ensuring that passwords are not easily guessable or traceable, often through techniques like using complex combinations or encryption
    Password Obscurity
  •  10
  • Firewall
    A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules to protect systems from unauthorized ac
  •  15
  • The use of software or strategies to detect, prevent, and remove malware (malicious software) like viruses, worms, and trojans.
    Malware Protection
  •  10
  • Virus Protection
    The use of tools and techniques to detect and eliminate viruses from a system, ensuring the integrity and security of data and applications.
  •  15
  • The practices and measures taken to ensure that servers are protected from unauthorized access, cyber-attacks, and other security threats.
    Server Security
  •  10
  • User Account Permissions
    The rights or privileges assigned to user accounts, determining what actions users can perform within a system or network, such as read, write, or execute.
  •  15
  • Measures to ensure the security of data transmitted over the internet, including protecting Internet Protocol (IP) addresses and ensuring secure connections.
    Internet Protocol Security
  •  10
  • Shared Network Resources Protection
    The process of securing network resources (such as files, printers, or databases) from unauthorized access or misuse on a shared network.
  •  15
  • Ensuring that communication protocols (used to transfer data between systems) are secure and cannot be exploited by malicious users.
    Protocol Security
  •  10
  • Servers
    Specialized computers or systems that provide services (such as web hosting, email, file sharing) to other computers or devices in a network.
  •  15
  • A server designed to host applications, allowing clients to interact with those applications via network protocols like HTTP.
    Application Server
  •  10