Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
Copyright
|
the legal protection afforded an expression of an idea, such as a song, book, or video game
|
|
Intellectual Property
|
intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents
|
|
Pirated Software
|
the unauthorized use, duplication, distribution, or sale of copyrighted software
|
|
Counterfeit Software
|
software that is manufactured to look like the real thing and sold as such
|
|
Nonrepudiation
|
a contractual stipulation to ensure that ebusiness participants do not deny their online actions, included in the accepted use policy
|
|
Mail Bomb
|
sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning
|
|
Spam
|
unsolicited email
|
|
Types of hackers
|
-black-hat hackers
-crackers -cyber-terrorists -hactivists -script bunnies -white-hat hackers |
|
Black-hat Hackers
|
break into other people's computer systems and may just look around or may steal and destroy information
|
|
Crackers
|
have criminal intent when hacking
|
|
Cyber-terrorists
|
seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction
|
|
Hactivists
|
have philosophical and political reasons for breaking into systems and will often deface the website as a protest
|
|
Script bunnies
|
find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses
|
|
White-hat Hackers
|
work at the request of the system owners to find system vulnerabilities and plug the holes
|
|
Virus
|
software written with malicious intent to cause annoyance or damage
|
|
Spyware
|
a special class of adware that collects data about the use and transmits it over the Internet without the user's knowledge or permission
|
|
Social Engineering
|
hackers use their social skills to trick people into revealing access credentials or other valuable information
|
|
Dumpster Diving
|
looking through people's trash
|
|
Phishing
|
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
|
|
Pharming
|
rerouted requests for legitimate websites to false websites
|
|
Content filtering
|
occursw when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information
|
|
Digital certificate
|
data file that identifies individuals or organizations online and is comparable to a digital signature
|
|
Firewall
|
hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings
|
|
Intrusion Detection Software (IDS)
|
features full-time monitoring tools that search for patterns in network traffic to identify intruders
|
|
Infrastructure
|
includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets; can reduse costs, improve productivity, optimize business operations, generate growth, and increase profitability
|
|
Disaster Recovery
|
able to recover information or systems in the event of a catastrophic disaster such as a fire or flood
|
|
Business Continuity Planning (BCP)
|
created a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption
|
|
Fault Tolerance
|
the ability for a system to respond to an unexpected failure or system crash as the backup system immediately and automatically takes over with no loss of service;enabling businesses to support continuous operations if there is a power failure or flood
|
|
Failover
|
a specific type of fault tolerance that occurs when a redundant storage server offers an exact replica of the real-time data and if the primary server crashes, the users are automatically directed to the secondary server or backup server
|
|
Failback
|
occurs when the primary machine recovers and resumes operations, taking over from the secondary server
|
|
Hot site
|
a separate and fully equipped facility where the company can move immediately after a disaster and resume business
|
|
Cold site
|
a separate facility that does not have any computer equipment but is a place where employees can move after a disaster
|
|
Warm site
|
a separate facility with computer equipment that requires installation and configuration
|
|
Capacity planning
|
determines future environmental infrastructure requirements to ensure high-quality system performance
|
|
Moore's Law
|
computer chip performance per dollar doubles every 18 months
|
|
Granularity
|
refers to the extent of detail within the information (fine and detailed or coarse and abstract)
|
|
Transactional information
|
encompasses all of the information contained within a single business process or unit of work, and it's primary purpose is to support daily operational tasks
|
|
Analytical information
|
encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks like making important decisions
|
|
Redundancy
|
the duplication of data, or the storage of the same data in multiple places, can cause storage and data integrity issues
|
|
Relational Integrity Constraints
|
rules that enforce basic and fundamental information-based constraints like not allowing someone to create an order for a nonexistent customer or order zero pounds of raw materials
|
|
Business-critical Integrity Constraints
|
enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints, such as constraint stating no product returns are accepted after 15 days past delivery
|
|
Extraction, Transformation, and Loading (ETL)
|
a process that extracts information from internal and external databases. transforms it using a common set of enterprise definitions, and loads it into a data warehouse
|
|
Multidimensional analysis
|
a relational database containing information in a series of two-dimensional tables, the common term a cube
|
|
Information Cleansing
|
a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
|
|
Data Mining
|
process of analyzing data to extract information not offered by the raw data alone
|
|
Text Mining
|
analyzes unstructured data to find trends and patterns in words and sentences, like when handling customer service emails
|
|
Web Mining
|
analyzes unstructured data associated with websites to identify consumer behavior and website navigation, with cluster analysis, association detection, and statistical analysis
|
|
Cluster Analysis
|
a technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible, example is to create target marketing strategies based on zip codes
|
|
Association Detection
|
reveals the relationship between variables along with the nature and frequency of the relationships
|
|
Market Basket Analysis
|
analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services
|