• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
What are the three major components to a user friendly Web experience.
1. Information
2. Interaction
3. Graphics
Which are the components of a web presence budget?
- Telecommunications
- Hosting service
- Design
- Content development
- Marketing
- Hardware
- Software
Describe the platforms and activities of Web sites.
Platform:
- Traditional
- Mobile
- Tablet
Activities:
- Search
- Display
- Affiliates
- Sponsorships
Describe the platforms and activities of E-mail.
Platforms:
- Internal lists
- Purchased lists
Activities:
- Newsletters
- Updates
- Sales
Describe the platforms and activities of social media.
Platforms:
- Facebook
- Twitter
- Blogs
Activities:
- Conversation
- Engagement
- Sharing
- Advice
Describe the platforms and activities of offline media.
Platforms:
- Print
- TV and radio
Activities:
- Education
- Exposure
- Branding
Explain the systematic approach.
• Analysis/planning
– objectives
– functionalities
– Information
• Design
– Logical
– Physical – Graphical
• Building
– Own/hosting
– Outsourcing
• Testing
– Unit/system/acceptance
• Implementation & Maintenance
Explain the six dimensions and perspectives on security.
1. Privacy
2. Integrity
3. Nonrepudiation
4. Authenticity
5. Confidentiality
6. Availability
List the three vulnerabilities.
1. Client
2. Server
3. Communications pipeline
Describes some threats.
- Malicious code
- Potentially unwanted programs
- Phishing
- Hacking
- Credit card fraud
Name four technology solutions.
1. Protect Internet communications
• encryption
2. Secure channels of
communication
• SSL, VPNs
3. Protect networks
• Firewalls & proxy servers
4. Protect servers and
clients
• Operating system
Discuss organization and society.
Policies & procedures
• Risk management
• Security plan
• Information policy
Laws & standards
• That give authority and recommendations
• Private and public