Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
5 Cards in this Set
- Front
- Back
define Call back procedures |
User logs onto a computer which immediately disconnects the line then dials the user back which avoids the user logging in with someone else s details. |
|
define Firewalls |
A dedicated gateway machine with special security precautions on it to monitor a network especially those against hackers through the internet. |
|
define Data integrity |
Integrity is ensured by: Parity: A bit added onto the end of a byte making all bytes transmitted EVEN, if it recived and is odd, the data is corrupt and will not be used. Checksum: All the bits transmitted are added and the value is known as the check-sum, if the value received equates to less than this then data has been corrupted Cyclic Redundancy Check: Like the checksum |
|
define possible disasters |
.Fire, Floods, hurricanes .Hardware failure .Software failure .deliberate vandalism .accidents .network failure |
|
define the steps taking towards disaster planning |
[BEFORE] .risk analysis .preventative measures .staff training [DURING] .what response staff should make to disaster [AFTER] .Recovery measures Hardware-Easily (expensive) replaced Software-Can be reinstalled, Data is the most important variable to protect and the hardest to retrieve Backups-VERY IMPORTANT TO BACK ALL DATA, TAKES A LONG TIME |