1.4 Value of Data and Information Flashcards

1
Q

What is not an example of security controls?

A

Audits and inventories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you call an action through which someone uses, makes, sells, or imports your invention without your permission?

A

Patent infringement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a data exfiltration?

A

A security breach that occurs when an individual’s or organization’s data is illegally copied with or without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When does data become information?

A

When it is applied to some purpose and adds timely value for the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a disadvantage of a semi-structured data warehouse for storing information?

A

The traditional relational data model has a popular and ready-made query language, SQL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data correlation?

A

The process of analyzing the whole data set and finding connections and links between data points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the first step needed to begin a data-driven business decision?

A

Set-up of data capture and collection system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What invention was created to try to enforce copyright protection on digital products?

A

Digital Rights Management (DRM) systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Information Technology (IT) terminology, what is ROSI and how do you calculate it?

A

Return on Security Investment; to calculate ROSI, you perform risk assessments to work out how much the loss of data would cost your organization and how likely it is that data loss might occur when an attacker removes data from your network without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a data breach?

A

When your network exposes private data publicly, whether or not the data is actively stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is intellectual property protected?

A

Intellectual property can be protected through trademarks, copyrights, and patents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of a digital product?

A

A video download.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is not a positive trait of a digital product in regard to the value assigned to information and data?

A

Digital sales through peer-to-peer transactions make it easier to sell information without the oversight of an institutional set of rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is copyright used for?

A

It is a legal protection granted to certain types of work that gives its holder the right to control the use of the work, including rights of publication, distribution, or sale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is true about the protection of data?

A

Data can be considered an asset and as such it has commercial value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is used to protect a name or logo?

A

A trademark protects a unique element such as a company name or logo.

17
Q

What activities must one perform to make data-driven business decisions?

A

Capture data, correlate the data, and convert it into meaningful reports.

18
Q

How do you protect an idea or invention without actually creating an example of it?

A

You can patent it.

19
Q

What is used in lieu of a copyright to protect a name or logo?

A

A trademark.

20
Q

Why is meaningful reporting an important factor of data-driven business decisions?

A

It allows a human to analyze and interpret the information.

21
Q
A