BEC-IT Flashcards
Web crawlers
Search engines (like google) use Web crawlers programs to go on the web, visit web sites and collect information that is used to create entries for the search engine’s index.
Worm
A type of malware (similar to virus) whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
Worms generally try to accomplish this by activating the system’s email client and sending multiple emails.
Worms can modify and delete files, and they can even inject additional malicious software onto a computer.
Worms generally exist inside of other files; unlike viruses, they are not stand-alone programs.
Denial of service (DoS) attack
Prevents legitimate users from accessing the system.
Perpetrators conduct these attacks, using one or many computers, to flood a server with access requests that cannot be completed. These include ransom and blackmail DoS attacks in which the criminal threatens to deny service unless the user pays a ransom or engages in a specific act (e.g., grants access to their system).
Trojan horse
A malicious program hidden inside a seemingly normal file. Frequently used to insert back doors into a system
Social engineering or spoofing
Using deceit or deception to gain logical access to the system. The deception is to persuade employees to provide usernames and passwords to the system. These deceptive requests may be delivered verbally or through email, text messaging, or social networking sites. Fraudsters may spoof by faking an identity (e.g., a company or friend) or an email (e.g., pretending to be your bank or a friend of yours) or by creating a website that mimics a real website.
Packet sniffing
Programs called packet sniffers capture packets of data as they move across a computer network. While administrators use packet sniffing to monitor network performance or troubleshoot problems with network communications, hackers also use these tools to capture usernames and passwords, IP addresses, and other information that can help them break into the network. Packet sniffing on a computer network is similar to wiretapping a phone line. This is one form of a man-in-the-middle attack.
Closed-loop verification
Closed-loop verification helps ensure that a valid and correct customer account has been entered; after the code is entered, this system looks up and displays additional information about the selected code. For example, the operator enters a customer code, and the system displays the customer’s name and address.
Hash total
Hash total is a control over whether the total quantity of items entered by the clerks matches the total quantity of items in the orders placed. This is a control over only one field on the purchase orders (i.e., over the quantity of items ordered)
Parity check
Parity check is designed to detect errors in data transmission.
It does this by adding an extra data bit to each data unit.
boundary protection
Boundary Protection to prevent and detect malicious and other unauthorized communications, through the use of boundary protection devices (e.g. gateways, routers, firewalls, guards, encrypted tunnels).
Picking ticket
Picking Ticket identifies the items to be pulled for a sales order.
P
OLAP
Part of an ERP System
Online Analytical Processing (OLAP) system
Incorporates data warehouse and data mining capabilities within the ERP
A server that collects data and can extract and transform them.
XBRL
eXtensible Business Reporting Language is a tagging language for financial data.
It tags financial elements like General Ledger accounts and “tags” the data for reporting and regulatory purposes.
XBRL is also used in filings with the Securities and Exchange Commission that are made available on EDGAR, the SEC’s Electronic Data Gathering and Retrieval database.
Extranets
Private Portals/Platforms network that allows access granted users (company suppliers, customers, business partners, etc.) to access data that is relevant to them ( think of Ariba suppliers) Most secure and private.
Intranets
Intranet is internal to the business (available only to members of the organization (business, school, association) allowing users access to internal data.
Often used to connect geographically separate LANs within a company.
Private (e.g., limited access) networks built using Internet protocols
RSS (Really Simple Syndication)/ATOM Feeds
An easy way to get news and information. Updates and notifications are gathered on a regular basis real time and put on a dashboard.
XML (extensible Markup Language) application that facilitates the sharing and syndication of website content by subscription.
Internet service providers (ISPs)
End-user access to the Internet is provided by Internet service providers (ISPs) that either provide direct connections to the Internet backbone (a collection of extremely high-speed, high-capacity communications lines joined together at network access points) or connect to larger ISPs that ultimately provide that connection.