Terminology
Computer Security
Protecting computer systems, networks, and data from unauthorized access or damage.
spam emails
Unsolicited messages sent in bulk for advertising, phishing, or malware distribution.
two-factor authentication
Extra security layer requiring two forms of identification for account access.
reCAPTCHA
Verifies users as human, not bots, using image challenges or puzzles.
common issues
Malware, data breaches, social engineering, weak passwords, and lack of awareness.
steps individuals should take to protect their data
Use strong passwords, enable 2FA, update software, avoid suspicious links, backup files, and be cautious online.
data privacy
Protecting personal and sensitive information from unauthorized access or disclosure.
ways to protect individual computers
Use antivirus software, firewalls, update software, avoid unknown sources, and be cautious online.
ways to protect computers managed by an organisation
Implement access controls, network security, encryption, regular audits, employee training, and incident response.
policies or practices of a multi-national technology corporation*
The policies or practices of a multi-national technology corporation typically include data privacy and security policies, guidelines for handling user data, regular security audits, security awareness training for employees, monitoring and detection of security threats, incident response plans, and adherence to relevant legal and regulatory requirements in different countries where they operate.