• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/102

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

102 Cards in this Set

  • Front
  • Back
Firewall, helps protect pc from hackers who try delete info, crash pc or steal p-words or cc#s
Three basic types of firewalls are available for you to choose from:Software firewalls are a good choice for single computers, and they work well with Windows 98, Windows Me, and Windows 2000. (Windows Vista and Windows XP both have a built-in firewall, so an additional firewall is not necessary.)

2)Hardware routers are a good choice for home networks that will connect to the Internet

3)If you have or plan to use a wireless network, you need a wireless router
Trojan horse
Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
Botnets
What they are:
A collection of software robots, or 'bots', that creates an army of infected computers (known as ‘zombies’) that are remotely controlled by the originator. Yours may be one of them and you may not even know it.

What they can do:
•Send spam emails with viruses attached.
•Spread all types of malware.
•Can use your computer as part of a denial of service attack against other systems.
Malware is one of the more common ways to infiltrate or damage your computer.
What it is:
Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.

What it can do:
•Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information.
•Reformat the hard drive of your computer causing you to lose all your information.
•Alter or delete files.
•Steal sensitive information.
•Send emails on your behalf.
•Take control of your computer and all the software running on it.
Pharming is a common type of online fraud
What it is:
A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.

What it can do:
•Convince you that the site is real and legitimate by spoofing or looking almost identical to the actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent.
Phishing is used most often by cyber criminals because it’s easy to execute and can produce the results they’re looking for with very little effort.
What it is:
Fake emails, text messages and websites created to look like they’re from authentic companies. They’re sent by criminals to steal personal and financial information from you. This is also known as “spoofing”.

What it does:
•Trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner than seems official and intimidating, to encourage you to take action.
•Provides cyber criminals with your username and passwords so that they can access your accounts (your online bank account, shopping accounts, etc.) and steal your credit card numbers.
SpamSpam is one of the more common methods of both sending information out and collecting it from unsuspecting people.
What it is:
•The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.
•Canada’s anti-spam legislation applies to all commercial electronic messages. A commercial electronic message is any electronic message that encourages participation in a commercial activity, regardless of whether there is an expectation of profit.
What it can do:
•Annoy you with unwanted junk mail.
•Create a burden for communications service providers and businesses to filter electronic messages.
•Phish for your information by tricking you into following links or entering details with too-good-to-be-true offers and promotions.
•Provide a vehicle for malware, scams, fraud and threats to your privacy
Spoofing:This technique is often used in conjunction with phishing in an attempt to steal your information.
What it is:
A website or email address that is created to look like it comes from a legitimate source. An email address may even include your own name, or the name of someone you know, making it difficult to discern whether or not the sender is real.

What it does:
•Spends spam using your email address, or a variation of your email address, to your contact list.
•Recreates websites that closely resemble the authentic site. This could be a financial institution or other site that requires login or other personal information.
Spyware and adware are often used by third parties to infiltrate your computer.
What it is:
Software that collects personal information about you without you knowing. They often come in the form of a ‘free’ download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer with viruses.

What it can do:
•Collect information about you without you knowing about it and give it to third parties.
•Send your usernames, passwords, surfing habits, list of applications you’ve downloaded, settings, and even the version of your operating system to third parties.
•Change the way your computer runs without your knowledge.
•Take you to unwanted sites or inundate you with uncontrollable pop-up ads.
Trojan horse
What it is:
A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it’s downloaded.

What it can do:
•Delete your files.
•Use your computer to hack other computers.
•Watch you through your web cam.
•Log your keystrokes (such as a credit card number you entered in an online purchase).
•Record usernames, passwords and other personal information.
Viruses
What they are:
Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of a virus.

What they can do:
•Send spam.
•Provide criminals with access to your computer and contact lists.
•Scan and find personal information like passwords on your computer.
•Hijack your web browser.
•Disable your security settings.
•Display unwanted ads.
When a program is running, the virus attached to it could infiltrate your hard drive and also spread to USB keys and external hard drives. Any attachment you create using this program and send to someone else could also infect them with the virus.
How do u know if your pc is infected?
Here are a few things to check for:

•It takes longer than usual for your computer to start up, it restarts on its own or doesn't start up at all.
•It takes a long time to launch a program.
•Files and data have disappeared.
•Your system and programs crash constantly.
•The homepage you set on your web browser is different (note that this could be caused by Adware that has been installed on your computer).
•Web pages are slow to load.
•Your computer screen looks distorted.
•Programs are running without your control.
If you suspect a problem, make sure your security software is up to date and run it to check for infection. If nothing is found, or if you are unsure of what to do, seek technical help.
Worms are a common threat to computers and the Internet as a whole
A worm, unlike a virus, goes to work on its own without attaching itself to files or programs. It lives in your computer memory, doesn’t damage or alter the hard drive and propagates by sending itself to other computers in a network – whether within a company or the Internet itself.

What they can do:
•Spread to everyone in your contact list.
•Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking havoc on an internal network and costing companies enormous amounts of lost revenue.
What is a cookie?
A collection of information, usually including a username and the current date and time, stored on the local computer of a person using the World Wide Web, used chiefly by websites to identify users who have previously registered or visited the site.
distributed denial of service
DDOS, short for Distributed Denial of Service, it is an attack where multiple compromised systems (which are usually infected with a Trojan) are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack. (Webopedia)
DNS: Domain Name System
A system for converting host names and domain names into IP addresses on the Internet or on local networks that use the TCP/IP protocol. For example, when a Web site address is given to the DNS either by typing a URL in a browser or behind the scenes from one application to another, DNS servers return the IP address of the server associated with that name.
function
Excel functions are built-in prewritten formulas that make it easy to do complex procedures with numbers, dates, times, text, and more.
protocol
An agreed-upon format for transmitting data between two devices. The protocol determines the following:

•the type of error checking to be used
•data compression method, if any
•how the sending device will indicate that it has finished sending a message
•how the receiving device will indicate that it has received a message
What is a RSS?
(Really Simple Syndication) A syndication format that was developed by Netscape in 1999 and became very popular for aggregating updates to blogs and news sites.
Google Alert
Google Alerts are email updates of the latest relevant Google results (web, news, etc.) based on your choice of query or topic.
Google Reader
Google Reader is a tool for gathering, reading, and sharing all the interesting blogs and websites you read on the web. This guide can help you familiarize yourself with the main features of Google Reader so that you can get started subscribing to and sharing feeds.
WolframAlpha
Wolfram|Alpha is the world's first and only computational knowledge engine. It can Compute answers, It's NOT a SEARCH engine!!
data visualization
present data that is easier to understand
IT Infrastructure
collection of hardware, software, users, processes and networks
data, or raw data
refers to raw material fr which info's produced.
Ex: # of hrs employee worked in 1 week
Info
data thats been processed, organized so it has meaning/value to person receiving it
knowledge
consists of data & or info that has been processed, org. and put into context to be meaningful and convey understanding
database
stored data organized for access, retrieval, search & update
text
unstructured data & an asset that can be managed
text mining
powerful software tools that can extract & discover knowledge fr text docs.
data warehouse
special type of database that aggregates data fr transaction databases so it can be analyzed.
data management
structured approach for capturing, storing, processing, integrating, distributing, securing & archiving data effectively throughout its lifecycle
enterprise portals
set of software applications that consolidate, manage, analyze & transmit data to the users thru web-based interface
master data management (MDM)
process where companies integrate data fr various sources to provide a more unified view of data
data entity
anything real or abstract about which a company wants to collect & store data (customer, vendor, employee, product)
Master data entities
are main entities of a company, such as:customers, products, suppliers, employees&assets
data mart
small data warehouse designed for a SBU (strategic business unit) or a single dept.
ETL
Extract, transform & load
data mining (aka data discovery)
process of analyzing data from different perspectives & summarizing it into info that can increase revenue, decrease costs-or both
GIGO
garbage in, garbage out
potentially riskier garbage in, gospel out (poor quality data is used as basis for planning)
data quality
a measure of the datas usefulness as well as the quality of the decisions based on data
data quality has 5 dimensions:
accuracy,accessibility, relevance,timeliness & completeness
document management
automated control of imaged & electronic documents, page images, spreadsheets, email, voice messages from creation to destruction
DMS(document management systems)
hardware&software that manage & archive electronic docs & convert paper docs into e-docs, then index & store them EX: business required to hold docs for 7yrs
DMS help business become more efficient by:
1)enabling comp. to access & use content contained in data
2)cut labor costs
3)reduce time & effort
4)improve security of content
5)minimize costs(printing,storing & searching)
green computing
is initiative to conserve our natural, valuable resources by reducing the effects of our comp. usage on the environment
Bit
smallest unit of data that can be processed, either a 0 or 1
Byte
a group of 8 bits, usually called a character(letter, # or symbol)
field
characters that are combined to form a word, group of words or a complete #
File
collection of related records
database
a logical group of related files
attribute
customer name, invoice # or order date...
primary key
unique identifier field, usually numeric. helps pull up specific account
sequential file organization
which is way files are org. on tape, data must be retrieved in same physical sequence are stored. like a tape recorder
direct file organization, or random file organization
records can be accessed directly regardless of location on storage medium. Like a DVD Drive
ISAM(index sequential access method)
uses an index of key fields to locate individual records
mobility
secure reliable access from anywhere at acceptible speeds
collaboration
working as a team or with others having access to and or sharing docs and files
relationships
maintaining contact with customers, supply partners, shareholders, employees
2 types of switching are:
1)circuit switching:older tech. POTS (plain old telephone service)
2)packet switching:path of signal is digital, neither dedicated or exclusive. break a file into packets, when reach destination-are re organized
routers
devices that forward packets fr 1 network to another, connect networks that use different ntwrk technologies.
bandwidth
measure of speed at which data is transmitted, throughput capacity of a ntwrk.
TCP/IP
transmission control protocol/internet protocol
broadband
short for broadbandwidth, FAST transmission speed
download speed
how quickly data can be received fr the internet, how fast a connection can deliver data to a mobile or pc
upload
how fast a connection can transfer data fr the source comp. or mobile device. dl is faster then upldng.
fixed line broadband
either cable or DSL internet connections
mobile broadband
various types of wireless, hi-speed internet access thru a portable modem
IP networks
form backbone of worldwide digital ntwrkng. encourage merger of voice,data,video,&radio waves.can be digitized into packets & sent via any digital ntwrk
ntwrk devices & technologies:
laptops,pda's,cell&smart phones,wikis,intranets,extranets,GPS,POS(point of sale),RFID(radio frequency identification)-communicated with networks to send/receive data. DATA must be Rapidly collected,processed,shared,&acted upon
mobile infrastructure
consists of integration of technology,software,support,security measures&devices for mngmnt & delivery of wireless communications
wi-fi
technology that allows computers to share network or internet connection wirelessly w/o need to connect to commercial network. They beam LARGE chunks of data over short distances using part of radio spectrum
3 types of wireless networks:
1)WAN (wide area network)
2)Wimax
3)WWAN(wireless wide area ntwrks)
WLAN
wireless local area network, uses hi-frequency radio waves rather then wires to communicate between devices
WIMAX
standards based techn. enabling delivery of last mile wireless broadband access as alternative to cable and DSL (free internet)
intranet
a network serving international informational needs of a company. Are portals(gateways) that provide easy & inexpensive browsing & search capabilities.
enterprise search
provides fast query response & consolidated, ranked results (like google) that help users easily locate info they need.
extranet
private,company-owned network that uses IP technology to securely share part of a business' info or operations w/suppliers,vendors,partners,customers, or other business'. Can us VPN(virtual private ntwrks)
VPN
created using specialized software/hardware to encrypt,send,decrypt transmissions over the internet. Creates a 'private tunnel' for 2 companies
Portal
web based gateway to the content on a network. Like discussion boards,doc.sharing and workspaces.
google wave
equal parts documentation and conversation. Its a new platform of email, im'ing and docs. PPl can communicate & work together-reply mssg, edit,add participants
MAC address
Media Access Control Address: the unique serial number burned into ethernet & token ring adapters that identifies that network card from all others
NIC
Network Interface Cards:
Moore's Law:
Gordon Moore, founder of the Intel Corp. stated in 1965 thatthat the number of transistors on a microprocessor would double periodically (approximately every 18 months).
changedetection.com
an alert by email when a website page changes
prezi
a web based presentation tool using a map and layout & zooming to show shortcomings of microsoft powerpoint
protection power
a canadian company that specializes in personal information protection services
DHCP (Dynamic Host Configuration Protocol)
network configuration protocol for hosts on IP networks.
Whois
domain search
traceroute
computer network diagnostic tool for displaying the route(path)& measuring transit delays of packets across an IP network
DWY
Driving while yakking
NHTSA
National Highway Traffic Safety Administration
SAR
Specific Absorption Rate: the measure of rf (radio frequency) that is absorbed by the body
business continuity plan
aka the disaster recovery plan
risk management analysis
expected loss=p1xp2xl
SOX (Sarbanes Oxly Act)
anti-fraud law
WEP
wired equivalent privacy:
two factor authentication
aka multi-factor authentication:
network security has 3 types of levels
1)perimeter security, to access the network
2)authentication:to verify the identity of person,username, passwords
3)authorization:controls what authenticated users can do once access network, permissions and directories
biometric control
automated method of verifying identity of person, thumbprint, fingerprint, retinal scan,voice scan,signature
IDS (intrusion detection systems)
scans for unusual or suspicious traffic
unintentional threats fall into 3 categories:
1)human error, environmental hazards, and computer system failures