Security
Cyber dependent - Answer illegal activities dependent on the use of computers and the
internet, such as hacking or the distribution of malware on a network
Access Management - Answer Managing the access to a computer system/network. It
includes the procedures such as account administration, account maintenance account
monitoring and the revoking of an account.
Account lockout - Answer A method performed by an OS that locks the user account
when a user fails a login attempt more than a set number of times user
Alarm systems and sensors - Answer Works in tandem with physical barriers,
mechanical systems, and security guards, serving to trigger a response when these
other forms of security have been breached. Consist of sensors including motion
sensors, contact sensors and glass break detectors
Anomaly based software - Answer Software that is designed to detect computer
intrusions and misuse by monitoring system activity and clarifying it as either normal or
anomalous (abnormal behavior)
Anti-malware software - Answer Software designed to prevent, detect, and remove
malicious software, such as a virus or a worm
Application Security - Answer Use of software, hardware and procedural methods to
protect applications from external threats
Asset - Answer Something that is of value to a person, organisation or state
Attacker - Answer Individuals or organisations that target computer systems/networks
illegally.
Audit trail - Answer A record of activities on a computer system/network E.g a record of
modification to data or access to parts of a system/network
Availability - Answer Level of assurance that the data will be available to those who
need it when they want it.
Bio-metric access - Answer Access to a computer system or network using technologies
that measure and analyse human body characteristics for authentication purposes, such
as DNA, fingerprints, retinas, voice patterns
Black hat hacker - Answer An individual with extensive computer knowledge whose
purpose is to breach or bypass internet security. These individuals are also known as
crackers or dark-side hackers.