Chapter1-A person with an interest in an issue or someone who is affected by an issue.
Equality of Access
Chapter1-Involves a user proving their identity. → Authenticity
Chapter1-When a user attempts to access an area of a system they are not permitted to be accessing. : Security
Chapter1-How data is communicated to other systems.
Chapter2-Storage unit: 1024 megabytes.
Chapter2- System of tags which contain data that can be read from a distance using radio waves.
Random Access Memory
Optical Mark Recognition
Optical Character Recognition
Radio Frequency Identification
Chapter2- Storage systems which are found inside the computer and are electronic. RAM and ROM are examples. : Primary storage
Chapter3- Software, whose source code is freely available and can be changed and distributed.
Chapter 3- Application software for creating written documents such as letters or essays.
web development software
word processing software
desktop publishing software
Chapter3- Application software for creating and editing presentations, animations, and video. → spreadsheet software
Chapter4- Hardware or software that controls access to a network. → firewall
Chapter4- Computer on a network that provides services or performs work for others.
Chapter4- Unique address embedded in network connected devices.
Chapter4- System that automatically assigns IP addresses to computers on a network.
Dynamic Host Control Protocol
File Transfer Protocol
Chapter4- Network in which all computers are equal and there are no centralised servers.
Peer to Peer
Server / Client
Personal Area Network
Chapter4-To transfer data from a client computer to a server → download
Chapter5- Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.
Chapter5- Result of encrypting plaintext. → encryption key
Chapter5-vulnerability scanner → Software to scan a system for potential security problems
Chapter5- Encryption system in which two keys are used: a public key used only to encrypt data, and a private key used only to decrypt it.
symmetric key encryption
Secure Socket Layer
full disk encryption
asymmetric key encryption