• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
Copyright
the legal protection afforded an expression of an idea, such as a song, book, or video game
Intellectual Property
intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents
Pirated Software
the unauthorized use, duplication, distribution, or sale of copyrighted software
Counterfeit Software
software that is manufactured to look like the real thing and sold as such
Nonrepudiation
a contractual stipulation to ensure that ebusiness participants do not deny their online actions, included in the accepted use policy
Mail Bomb
sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning
Spam
unsolicited email
Types of hackers
-black-hat hackers
-crackers
-cyber-terrorists
-hactivists
-script bunnies
-white-hat hackers
Black-hat Hackers
break into other people's computer systems and may just look around or may steal and destroy information
Crackers
have criminal intent when hacking
Cyber-terrorists
seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction
Hactivists
have philosophical and political reasons for breaking into systems and will often deface the website as a protest
Script bunnies
find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses
White-hat Hackers
work at the request of the system owners to find system vulnerabilities and plug the holes
Virus
software written with malicious intent to cause annoyance or damage
Spyware
a special class of adware that collects data about the use and transmits it over the Internet without the user's knowledge or permission
Social Engineering
hackers use their social skills to trick people into revealing access credentials or other valuable information
Dumpster Diving
looking through people's trash
Phishing
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
Pharming
rerouted requests for legitimate websites to false websites
Content filtering
occursw when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information
Digital certificate
data file that identifies individuals or organizations online and is comparable to a digital signature
Firewall
hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings
Intrusion Detection Software (IDS)
features full-time monitoring tools that search for patterns in network traffic to identify intruders
Infrastructure
includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets; can reduse costs, improve productivity, optimize business operations, generate growth, and increase profitability
Disaster Recovery
able to recover information or systems in the event of a catastrophic disaster such as a fire or flood
Business Continuity Planning (BCP)
created a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption
Fault Tolerance
the ability for a system to respond to an unexpected failure or system crash as the backup system immediately and automatically takes over with no loss of service;enabling businesses to support continuous operations if there is a power failure or flood
Failover
a specific type of fault tolerance that occurs when a redundant storage server offers an exact replica of the real-time data and if the primary server crashes, the users are automatically directed to the secondary server or backup server
Failback
occurs when the primary machine recovers and resumes operations, taking over from the secondary server
Hot site
a separate and fully equipped facility where the company can move immediately after a disaster and resume business
Cold site
a separate facility that does not have any computer equipment but is a place where employees can move after a disaster
Warm site
a separate facility with computer equipment that requires installation and configuration
Capacity planning
determines future environmental infrastructure requirements to ensure high-quality system performance
Moore's Law
computer chip performance per dollar doubles every 18 months
Granularity
refers to the extent of detail within the information (fine and detailed or coarse and abstract)
Transactional information
encompasses all of the information contained within a single business process or unit of work, and it's primary purpose is to support daily operational tasks
Analytical information
encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks like making important decisions
Redundancy
the duplication of data, or the storage of the same data in multiple places, can cause storage and data integrity issues
Relational Integrity Constraints
rules that enforce basic and fundamental information-based constraints like not allowing someone to create an order for a nonexistent customer or order zero pounds of raw materials
Business-critical Integrity Constraints
enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints, such as constraint stating no product returns are accepted after 15 days past delivery
Extraction, Transformation, and Loading (ETL)
a process that extracts information from internal and external databases. transforms it using a common set of enterprise definitions, and loads it into a data warehouse
Multidimensional analysis
a relational database containing information in a series of two-dimensional tables, the common term a cube
Information Cleansing
a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
Data Mining
process of analyzing data to extract information not offered by the raw data alone
Text Mining
analyzes unstructured data to find trends and patterns in words and sentences, like when handling customer service emails
Web Mining
analyzes unstructured data associated with websites to identify consumer behavior and website navigation, with cluster analysis, association detection, and statistical analysis
Cluster Analysis
a technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible, example is to create target marketing strategies based on zip codes
Association Detection
reveals the relationship between variables along with the nature and frequency of the relationships
Market Basket Analysis
analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services