21 questions
The accuracy, reliability and consistency of data
Data integrity
Data security
Data archiving
Data entry
A person who uses computers to gain unauthorized access to data
Saboteur
Hacker
Fraudster
Criminal
A malicious program that attaches itself to an executable piece of software, and then reproduces itself when the file is run.
Worm
Trojan horse
Malware
Virus
Measures that are put in place to ensure data is safe
Data integrity
Data protection
Data security
Data authorisation
Any act using computers/the Internet to defraud people
Computer fraud
Phising
Keylogging
Identity theft
The illegal practice of monitoring/investigating another business for a competitive advantage
Electronic eavesdropping
Propaganda
Industrial espionage
Software piracy
An input device that identifies a person based on the individual’s characteristics/traits (fingerprint)
Biometric scan
Biological print
Electronic footprint
Retinal scan
Hardware/software that protects a network from hostile intrusion that could compromise confidentiality or result in data corruption.
Blocking app
Firewall
Anti-virus software
Password
The act of electronically intercepting conversations without the knowledge or consent of a person.
Eavesdropping
Spying
Electronic eavesdropping
Decrypting
The illegal use of someone else's personal information (as a Social Security number) in order to obtain money or for some other personal gain
Internet fraud
Identity theft
Credit card fraud
Telemarketing schemes
The process of converting data into a code, especially to prevent unauthorized access
Program
Coding
Encryption
Algorithm
A software utility that detects, prevents, and removes viruses, worms, and other malware from a computer
Anti - virus software
Firewall
Counterfeiting
Trojan horse
The practice of using a software program or hardware device (keylogger) to record all keystrokes on a computer keyboard, either as a surveillance tool or as spyware
Computer surveillance
Hacking
Keylogging
Eleltronic records
The process of retaining data for long term storage
Monitoring system
Data archiving
Data retention
Storage
Information / ideas that are deliberately spread to help or harm a person or group
Gossip
Malware
Spyware
Propaganda
The illegal use, copying or distributing of software without ownership or legal rights.
Counterfeiting
Software piracy
Internet piracy
Impersonation
Programs that secretly record what you do on your computer
Malware
File virus
Spyware
Boot sector virus
A string of characters used for authenticating a user on a computer system.
User I.D.
Login credential
Software based data security
Password
Copies itself repeatedly, using up memory or disk space to crash a computer
Worm
Trojan horse
Email virus
Pre - installed software
The right of individuals to determine what information is stored about them and how that information will be used
Data piracy
Data privacy
Data integrity
Data archiving
Any type of fraud scheme that uses one or more components of the internet (chat rooms).
Computer fraud
Internet fraud
Computer surveillance
Credit card fraud