Chapter 0 Random Terms Flashcards

1
Q

Security Engineering

A

Security Engineering is focused on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts.

You want to have the ability to think “outside the box” and envision new strategies & potential attacks before they are used against you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems

A

bridges business & computer science (study & use of computers). It encompasses systems, people, & processes that create, store, & distribute information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network

A

a group of 2 or more computers joined together to communicate by exchanging information & sharing resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information Technology

A

a subet of Information Systems. It is the study, design, implementation, & support of computer-based information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Difference between IS & IT

A

IS is a large umbrella and IT falls under that umbrella, It has nothing to do with systems per say, IT deals with the technology involved in the sytems themselves, the study, design, implementation, & support of those technologies. So an analology would be taking a paper & pencil. The two objects themselves are tools or information technologies, if we combine them into a system for writing, it becomes an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kernel

A

a computer program that manages I/O requests from SW, and translates them into data processing instructiosn for the CPU (brain) & other electronics of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extranet

A

a computer network that allows controlled access from outside of an organization’s intranet. Extranets are used for specific use cases including business-to-business (B2B).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RPC

A

Remote Procedure Call - a protocol used to request a servuce from a program located on another computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

phishing

A

defrauding by posing as legitimate source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Collision Domain

A

A collision domain is a section of a network where data packets can collide with one another when being sent on a shared medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly