Level 30 Level 32
15 words 0 ignored
Ready to learn Ready to review
Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.
the protection of information from accidental or intentional misuse by persons inside or
Machine level security
refers to ations taken to protect information on a computer that may or may not be
making sure potential users are who they claim to be
Facial pattern recognition
a form of biometrics that uses a mathematical technique to measure the distances
Information copied to a different medium and stored at an offsite location so that it can be used
In the computer industry, refers to techniques for ensuring that data stored in a computer
File permission system
refer to specific access privelages of each user and each system resource in terms of
network security threats that origniate from witin a network, typically from a registered user.
__________ occurs when someone steals personal or confidential information.
Network usage policy
___________ is a document, aggreement, or
__________ refers to the unique threats and defenses associated witha
A __________ is an idividual who subverts computer security without authorization.
a __________ is a security system consisting of a combination of hardware and
a __________ fixes bugs on computer.
__________ is software designed to infiltrate or damage a computer system without the user's