Programs that are developed by companies other than the company that developed the computer's operating system.
What is third-party software
Locked Doors, Barred windows and restricted areas
What is barrier techniques
Main goal of Software Auditing
When personal information is accessed, disclosed without authorisation, or is lost
What is a Data Breach
Input of SQL code in a database to maliciously affect it
What is an SQL injection attack
To complete work to the best of your ability
Ethical Reponsiblility
The software and procedures used to assist in the protection of information systems and the files created, communicated and stored by individuals and organisations
Software security controls
Identifying security vulnerabilities in web applications by challenging every page and line of code in the application for known weaknesses
What is Penetration testing (Pen Test)
An attack 'spoofs' an unsecured wifi network that a client connects too
What is a Man-in-the-middle attack
Input of Javascript into vulnerable websites to malicious affects it
What is a Cross-Site Scripting (XSS) attack?
-Accuracy
- Authenticity
- Correctness
- Reasonableness
-Relevance
- Timeliness
Are characteristics of What?
Of Data that has integrity
Version control
Poorley coded or malicious code that causes the following:
- Data loss
- Unauthorised access
- Third party services goes offline
- Compliance with tech standard
- Privacy issues
- Legal issues
Manipulation of a victim to provide personal information or to initiate a transaction
What is Social Engineering
Technique that involves overwhelming a web server with flood of traffic, causing it to crash or become unresponsive
Distributed Denial of Service (DDoS) attack
Encoding information so that is unreadable without the use of a key
Encryptio
A Malware that requires users to transport it from one computer to another?
What is a Worm