Level 30 Level 32
Level 31

436 - 450


15 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?
Information security
the protection of information from accidental or intentional misuse by persons inside or
Machine level security
refers to ations taken to protect information on a computer that may or may not be
Authentication
making sure potential users are who they claim to be
Facial pattern recognition
a form of biometrics that uses a mathematical technique to measure the distances
Data backup
Information copied to a different medium and stored at an offsite location so that it can be used
Network security
In the computer industry, refers to techniques for ensuring that data stored in a computer
File permission system
refer to specific access privelages of each user and each system resource in terms of
Interior threat
network security threats that origniate from witin a network, typically from a registered user.
Information theft
__________ occurs when someone steals personal or confidential information.
Network usage policy
___________ is a document, aggreement, or
Wireless security
__________ refers to the unique threats and defenses associated witha
Hacker
A __________ is an idividual who subverts computer security without authorization.
Firewall
a __________ is a security system consisting of a combination of hardware and
Software patch
a __________ fixes bugs on computer.
Malware
__________ is software designed to infiltrate or damage a computer system without the user's