Exam 1 Review Modules 1-5 Flashcards

1
Q

Module 1 Terms
What is computer literacy?
Computer literacy is….

A

the skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information literacy?

Information Literacy is….

A

the understanding the role of information in generating and using business intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Business Intelligence?

Business Intelligence is…

A

provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(TPSs) Transaction processing systems are…

A

focus on data collection and processing; the major reason for using them is cost reduction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(MIS) Management information systems are..

A

an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Major components of information systems are

A

data, database, the process, and the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data component

A

consists of raw facts and is a component of an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Database component

A

a collection of all relevant data organized in a series of integrated files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process component

A

component of an information system generates the most useful type of information for decision making, including transaction-processing reports and models for decision analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information component

A

consists of facts that have been analyzed by the process component and is an output of an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Useful information must be/have

A

timeliness, integrate with other data/information, consistency and accuracy, relevance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information technologies are

A

support information systems and use the Internet, computer networks, database systems, POS systems, and RFID tags.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Five Forces Model

A

Buyer Power, Supplier Power, Threat of substitute goods/services, Threat of new entrants, Rivalry among competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Buyer Power

A

Is high when customers have many option and low when they have fewer options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Supplier Power

A

Is high when customers have limited options and is low when customers have more options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

threat of substitute goods/ services

A

organizations use strategies to avoid the threat to gain customer loyalties. Ex. Fees, or Benefits depends on customer’s actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Threat of new entrants

A

Typically very low, organizations use focus strategies to prevent others duplicating or take customers from them. Ex. Bank switching takes a lot of time customers don’t want to waste.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Rivalry among competitors

A

is high when multiple competitor occupy the same marketplace, low when there are fewer competitors in a marketplace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CTO/CIO

A

chief information officer or chief technology officer person oversees long-range planning and keeps eye on developments in the field that affects an company’s success.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CPO

A

executive position includes the responsibility of managing the risks and business impacts of privacy laws and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

webmaster

A

designs and maintains an organizations website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

computer programmer

A

writes computer programs or software segments that allow the information system to preform a specific task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

database administrator

A

responsible for database design and implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

network administrator

A

This person oversees a company’s internal and external network systems, designing and implementing network systems that deliver correct information to the right decision maker in a timely manner. Providing network and cybersecurity is part of this position’s responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Module 2 Computers are
is a machine that accepts data as input, processes data without human intervention by using stored instructions, and outputs information.
26
Computer system are
consists of hardware and software. Hardware components are physical devices, such as keyboards, monitors, and processing units. The software component consists of programs written in computer languages
27
central processing unit CPU
is the heart of a computer. It is divided into two components: the arithmetic logic unit (ALU) and the control unit.
28
arithmetic logical units ALU
performs arithmetic operations (+, −, ∗, /) as well as comparison or relational operations (, =); the latter are used to compare numbers.
29
control unit
tells the computer what to do, such as instructing the computer which device to read or send output to.
30
disk drive
is a peripheral device for recording, storing, and retrieving information.
31
CPU case
is also known as a computer chassis or tower. It is the enclosure containing the computer’s main components.
32
motherboard
is the main circuit board containing connectors for attaching additional boards. It usually contains the CPU, basic input/output system (BIOS), memory, storage, interfaces, serial and parallel ports, expansion slots, and all the controllers for standard peripheral devices, such as the display monitor, disk drive, and keyboard.
33
Speed of computers
Computers process data with amazing speed. They are capable of responding to requests faster than humans can, which improves efficiency. Today’s high-speed computers make it possible for knowledge workers to perform tasks much faster than with the slower computers of the past. Typically, computer speed is measured as the number of instructions performed during the following fractions of a second: Millisecond: 1/1,000 of a second Microsecond: 1/1,000,000 of a second Nanosecond: 1/1,000,000,000 of a second Picosecond: 1/1,000,000,000,000 of a second
34
Accuracy of computers
Unlike humans, computers do not make mistakes. To understand computer accuracy more clearly, take a look at these two numbers: 4. 0000000000000000000000001 4. 0000000000000000000000002 To humans, these two numbers are so close that they are usually considered equal. To a computer, however, these two numbers are completely different. This degree of accuracy is critical in many computer applications. On a space mission, for example, computers are essential for calculating reentry times and locations for space shuttles. A small degree of inaccuracy could lead the space shuttle to land in Canada instead of the United States.
35
Storage and Retrieval of computers
Storage means saving data in computer memory, and retrieval means accessing data from memory. Computers can store vast quantities of data and locate a specific item quickly, which makes knowledge workers more efficient in performing their jobs.
36
size of storage
1 bit A single value of 0 or 1 8 bits 1 byte or character 2^10 bytes 1,000 bytes, or 1 kilobyte (KB) 2^20 bytes 1,000,000 bytes, or 1 megabyte (MB) 2^30 bytes 1,000,000,000 bytes, or 1 gigabyte (GB) 2^40 bytes 1,000,000,000,000 bytes, or 1 terabyte (TB) 2^50 bytes 1,000,000,000,000,000 bytes, or 1 petabyte (PB) 2^60 bytes 1,000,000,000,000,000,000 bytes, or 1 exabyte (EB)
37
input devices
send data and information to the computer. Examples include a keyboard and mouse.
38
output devices
is capable of representing information from a computer. The form of this output might be visual, audio, or digital; examples include printers, display monitors, and plotters.
39
main memory devices
stores data and information and is usually volatile; its contents are lost when electrical power is turned off. It plays a major role in a computer’s performance.
40
secondary memory devices
which is nonvolatile, holds data when the computer is off or during the course of a program’s operation. It also serves as archival storage.
41
random access memory RAM
is volatile memory, in which data can be read from and written to; it is also called read-write memory.
42
cache RAM
resides on the processor. Because memory access from main RAM storage takes several clock cycles (a few nanoseconds), cache RAM stores recently accessed memory so the processor is not waiting for the memory transfer.
43
read-only memory
is nonvolatile; data cannot be written to ROM.
44
magnetic disk
made of Mylar or metal, is used for random-access processing. In other words, data can be accessed in any order, regardless of its order on the surface.
45
magnetic tape
is made of a plastic material and stores data sequentially.
46
redundant array of independent disks raid
system is a collection of disk drives used for fault tolerance and improved performance and is typically found in large network systems.
47
cloud storage
Used for online storage and backup, cloud storage involves multiple virtual servers that are usually hosted by third parties. Customers buy or lease storage space from third parties based on their current or future needs.
48
server
a computer and all the software for managing network resources and offering services to a network.
49
operating system
a set of programs for controlling and managing computer hardware and software. It provides an interface between a computer and the user and increases computer efficiency by helping users share computer resources and by performing repetitive tasks for users.
50
bus
is a link between devices connected to the computer. It can be parallel or serial, internal (local) or external.
51
application software
can be commercial software or software developed in-house and is used to perform a variety of tasks on a personal computer.
52
machine language
the first generation of computer languages, consists of a series of 0s and 1s representing data or instructions. It is dependent on the machine, so code written for one type of computer does not work on another type of computer.
53
assembly language
the second generation of computer languages, is a higher-level language than machine language but is also machine dependent. It uses a series of short codes, or mnemonics, to represent data or instructions.
54
high level languages
are machine independent and part of the third generation of computer languages. Many languages are available, and each is designed for a specific purpose.
55
fourth generation languages
use macro codes that can take the place of several lines of programming. The commands are powerful and easy to learn, even for people with little computer training.
56
fifth generation languages
use some of the artificial intelligence technologies, such as knowledge-based systems, natural language processing (NLP), visual programming, and a graphical approach to programming. These languages are designed to facilitate natural conversations between you and the computer.
57
object oriented programming
language is organized around a system of objects that represent the real world as opposed to a series of computational steps used in traditional languages.
58
object
an item that contains both data and the procedures that read and manipulate it.
59
modularity
Codes are written for specific and self-contained modules. This makes it easier to write codes, modify them, and troubleshoot them easier than traditional codes. New features can easily be added as new modules without any impact on existing modules.
60
reuse of codes for other purposes
Codes written for one object can be simply modified by maintaining its major parts and applying it to another object.
61
effective problem solving
OOP languages allow the programmer to break down a program into small-sized problems that a programmer can solve one module or one object at a time.
62
Module 3 | database
a collection of related data that is stored in a central location or in multiple locations.
63
data hierarchy
the structure and organization of data, which involves fields, records, and files.
64
database management system dbms
software for creating, storing, maintaining, and accessing database files. A DBMS makes using databases more efficient.
65
sequential access fire structure
records in files are organized and processed in numerical or sequential order, typically the order in which they were entered
66
random access file structure
records can be accessed in any order, regardless of their physical locations in storage media. This method of access is fast and very effective when a small number of records need to be processed daily or weekly.
67
physical view
involves how data is stored on and retrieved from storage media, such as hard disks or magnetic tapes
68
logical view
involves how information appears to users and how it can be organized and retrieved.
69
relational model
uses a two-dimensional table of rows and columns of data. Rows are records (also called tuples), and columns are fields (also referred to as attributes).
70
data dictionary
stores definitions, such as data types for fields, default values, and validation rules for data in each field.
71
primary key
uniquely identifies every record in a relational database. Examples include student ID numbers, account numbers, Social Security numbers, and invoice numbers.
72
foreign key
a field in a relational table that matches the primary key column of another table. It can be used to cross-reference tables.
73
normalization
improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table.
74
components of DBMS
Database engine Data definition Data manipulation Application generation Data administration
75
structured query language
a standard fourth-generation query language used by many DBMS packages, such as Oracle 12c and Microsoft SQL Server. SQL consists of several keywords specifying actions to take.
76
query by example
you request data from a database by constructing a statement made up of query forms. With current graphical databases, you simply click to select query forms instead of having to remember keywords, as you do with SQL. You can add AND, OR, and NOT operators to the QBE form to fine-tune the query.
77
create, read, update, and delete
refers to the range of functions that data administrators determine who has permission to perform certain functions.
78
graph database
a database that uses graph structures for query operation with nodes, edges, and properties to represent and store data.
79
data-driven web site
acts as an interface to a database, retrieving data for users and allowing users to enter data in the database.
80
distributed database management system
stores data on multiple servers throughout an organization.
81
fragmentation approach
approach to a distributed DBMS addresses how tables are divided among multiple locations. There are three variations: horizontal, vertical, and mixed.
82
replication approach
approach to a distributed DBMS has each site store a copy of the data in the organization’s database.
83
allocation approach
approach to a distributed DBMS combines fragmentation and replication, with each site storing the data it uses most often.
84
object oriented databases
both data and their relationships are contained in a single object. An object consists of attributes and methods that can be performed on the object’s data.
85
encapsulation
refers to the grouping into a class of various objects along with their attributes and methods—meaning, grouping related items into a single unit. This helps handle more complex types of data, such as images and graphs
86
inheritance
refers to new objects being created faster and more easily by entering new data in attributes.
87
data warehouse
a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
88
extraction, transformation, and learning
refers to the processes used in a data warehouse. It includes extracting data from outside sources, transforming it to fit operational needs, and loading it into the end target (database or data warehouse).
89
online transaction processing
is used to facilitate and manage transaction-oriented applications, such as point-of-sale, data entry, and retrieval transaction processing. It generally uses internal data and responds in real time.
90
online analytical processing
generates business intelligence. It uses multiple sources of information and provides multidimensional analysis, such as viewing data based on time, product, and location.
91
data march
usually a smaller version of a data warehouse, used by a single department or function.
92
Business analytics
uses data and statistical methods to gain insight into the data and provide decision makers with information they can act on.
93
big data
is data so voluminous that conventional computing methods are not able to efficiently process and manage it.
94
Five dimensions of big data
variety, velocity, veracity, and value.
95
volume
The sheer quantity of transactions, measured in petabytes (1,024 terabytes) or exabytes (1,024 petabytes). Here are four examples of big data volume: All the packages shipped through the U.S. Postal Service the week before Christmas The sales of all Walmart stores on Black Friday All the items purchased from Amazon on Cyber Monday The number of Tweets sent or received around the world per day
96
variety
The combination of structured data (e.g., customers’ product ratings between 1 and 5) and unstructured data (e.g., call center conversations or customer complaints about a service or product). Most data available on social networks is unstructured. Businesses combine data collected from the Internet and various handheld and mobile devices with location-related data and multimedia data. Machine-to-machine communication data, which is collected and transmitted automatically, also plays a major role in big data operations.
97
velocity
The speed with which the data has to be gathered and processed. As an example, imagine a billboard that could display a particular ad as soon as a particular customer drives by it. The billboard would recognize the driver’s face by comparing it to a huge database, integrate that data with the driver’s social media data, find out what the driver’s favorites are based on the number of likes and dislikes on his or her Facebook page, then display the applicable ad. All of this would need to happen in a nanosecond; otherwise, the window of opportunity will be lost!
98
veracity
The trustworthiness and accuracy of the data. For example, social media posts, abbreviations, typos, and colloquial speeches make this dimension important. However, in most cases volumes make up for the lack of quality or accuracy
99
value
The value that the collected data brings to the decision-making process. If there is no value then the entire process of data collection and analysis would be a waste of resources and miss the windows of opportunities. That is why “value” is the most important “V” of big data.
100
privacy risks
Discrimination: Big data analytics may reveal information that gives a decision maker—such as a banker— a reason to approve or decline an individual’s loan application. Privacy breaches and embarrassments: Big data analytics may reveal that a customer of a retailer, for example, is pregnant, by sending out pregnancy promotional materials. The individual may not have yet made her pregnancy public, creating embarrassment and privacy issues for that individual. Unethical actions based on interpretations: Big data analytics may be misinterpreted and offer support for a decision that, while legal, may not be ethical. Loss of anonymity: Big data analytics, by combining several datasets and cross-referencing various data, could easily reveal the identity of individuals whose data were analyzed. Few legal protections exist for the involved individuals: There are, to date, few (if any) legal requirements for protecting privacy while using big data analytics.
101
database marketing
uses an organization’s database of customers and potential customers to promote products or services.
102
Tableau
a data visualization tool used for generating business intelligence. It is used to analyze data for generating trends using graphs and charts.
103
Power BI
a platform that allows a user to analyze and visualize data from different sources with different formats.
104
Module 4 | fake news
news, stories, or hoaxes created to intentionally misinform or deceive readers.
105
deep fakes
news, stories, or hoaxes created to intentionally misinform or deceive readers.
106
acceptable use policies
a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
107
accountability
refers to issues involving both the user’s and the organization’s responsibilities and liabilities.
108
nonrepudiation
is a method for binding all the parties to a contract.
109
spam
is an unsolicited e-mail sent for advertising purposes.
110
Ten Commandments of Computer Ethics
Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people’s computer work. Thou shalt not snoop around in other people’s files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not use or copy software for which you have not paid. Thou shalt not use other people’s computer resources without authorization. Thou shalt not appropriate other people’s intellectual output. Thou shalt think about the social consequences of the program you write. Thou shalt use a computer in ways that show consideration and respect
111
social media networking ethics
advocates that social media should be open and provide fair access to all of its users.
112
SME Continued...
Authenticity—Members should be trustworthy and sincere Transparency—Members should be honest and open with no hidden agenda Communication—Members should be open to know other members and be able to communicate openly
113
business networking ethics
advocates that in order to maintain a business network, not only should the organization provide open and fair access to all authorized users, it should also consider three types of networking, including utilitarian, emotional, and virtuous.
114
Types of BNE
Utilitarian networking—Ensures that the networking is a true utility, truthful, and is not wasting its users’ time. Emotional networking—Ensures that users will empathize with being ethical in all situations and emotion should not play a role. Virtuous networking—Ensures that all parties will act in good faith by sharing honest goals and participating in legitimate activities.
115
Censorship
hiding or limit the access and information from the Internet
116
Public information
posted by an organization or public agency, can be censored for public policy reasons—such as not allowing military secrets to be published, lest the information fall into enemy hands. Public information can also be censored if the content is deemed offensive to a political, religious, or cultural group. However, private information—what is posted by a person—is not subject to censorship because of your constitutional freedom of expression.
117
private information
what is posted by a person—is not subject to censorship because of your constitutional freedom of expression
118
Restricted Access to the Web
Another type of censorship is restricting access to the Web. Some countries, such as China, Myanmar (Burma), and Singapore, restrict or forbid their citizens’ access to the Web or try to censor the information posted on the Web.
119
internet neutrality
Internet neutrality (also known as “net neutrality”) must be practiced in all cases. According to this principle, Internet service providers (ISPs) and government agencies should treat all data on the Internet equally—that is, they should not block traffic, charge different rates, or discriminate in any way based on user, content, Web site, types of equipment in use, telecommunication provider, platform, or application
120
Children locks for parents on the Internet
Another concern is children searching for information on the Web. If a search includes keywords such as toys, pets, boys, or girls, for example, the results could list pornography sites. Guidelines for Web use have been published to inform parents of the benefits and hazards of the Web, and parents can use these to teach their children to use good judgment while on the Web
121
intellectual property
is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses.
122
cybersquatting
is registering, selling, or using a domain name to profit from someone else’s trademark.
123
digital divide
Information technology and the Internet have created a digital divide. Computers are still not affordable for many people. The digital divide has implications for education.
124
virtual organizations
are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so they can share skills and costs and have access to each other’s markets.
125
IT Harms
Teen tendonitis: Too much texting and poor posture cause pain in the hands, back, and neck. Stress: Too much time spent on handheld devices causes stress and fatigue. Sleep loss: Because most teenagers (and many adults) keep their smartphones nearby while sleeping, sleep interruption and sleep deprivation may result. Accidents: Some teens use their smartphones while driving for answering calls or texts; this may cause accidents. Increased anxiety: Delays in response or no response causes anxiety for teens. Cyberbullying: Studies show that nearly one-third of teens are victims of cyberbullying where identities of the perpetrators cannot be recognized. Risk of cancer: Although this is not conclusive, teens may have a greater risk of developing brain cancer for excessive use of smartphones compared to adults.
126
It Therapy Advice
Admit that you have a problem. Limit your Internet and smartphone use. Change communication patterns by not using mobile devices. Socialize with family and friends more. Find interests that does not involve mobile devices. Set and adhere to a schedule for mobile device use. Keep mobile devices inaccessible. Turn off your mobile devices at certain times of the day. Don’t bring your mobile device to bed. Ask for professional help!
127
Green computing
involves the design, manufacture, use, and disposal of computers, servers, and computing devices (such as monitors, printers, storage devices, and networking and communications equipment) in such a way that there is minimal impact on the environment.
128
Module 5 | Costs of Cyber crime
cybercrime could cost companies globally $5.2 trillion over the next five years The total cost will also include the expense of enhancing and upgrading a company’s network security after an attack. The CSIS (Center for Strategic and International Studies) report went further and included the opportunity costs associated with downtime and lost trust as well as the loss of sensitive business information. Job losses would include manufacturing jobs as well as jobs where stolen trade secrets and other intellectual properties resulted in jobs being moved overseas.In fact, the total cost may even be higher than the CSIS report projects, given that businesses often do not reveal or admit certain cybercrimes or do not even realize the amount of damage that has been caused by computer criminals and cyber criminals.
129
Spyware
software that secretly gathers information about users while they browse the Web.
130
Adware
a form of spyware that collects information about the user (without the user’s consent) to determine which advertisements to display in the user’s Web browser.
131
phishing
sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
132
pharming
directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers. The difference is that pharmers usually hijack an official Web site address, then alter its IP address so that users who enter the correct Web address are directed to the pharmers fraudulent Web site.
133
Baiting
in similar to phishing attacks. What distinguishes it from phishing is the promise that the baiter gives to the recipient.
134
quid pro quo
Similar to baiting, quid pro quo involves a hacker requesting the exchange of critical data or login information in exchange for a service or prize.
135
smishing
This technique tricks a user to download malware onto his or smartphone or other mobile devices.
136
vishing
This technique tricks a user to download malware onto his or smartphone or other mobile devices.
137
keystroke loggers
This technique tricks a user to download malware onto his or smartphone or other mobile devices.
138
sniffing
capturing and recording network traffic.
139
computer fraud
the unauthorized use of computer data for personal gain.
140
confidentiality
means that a system must prevent disclosing information to anyone who is not authorized to access it
141
integrity
refers to the accuracy of information resources within an organization.
142
availability
means that computers and networks are operating, and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster.
143
fault tolerant system
ensure availability in the event of a system failure by using a combination of hardware and software.
144
internal threats
Viruses Worms Trojan programs Logic bombs Backdoors Blended threats (e.g., a worm launched by a Trojan) Rootkits Denial-of-service attacks Social engineering Cryptojacking
145
virus
consists of self-propagating program code that is triggered by a specified time or event. When the program or operating system containing the virus is used, the virus attaches itself to other files, and the cycle continues.
146
worms
travels from computer to computer in a network, but it does not usually erase data. Unlike viruses, worms are independent programs that can spread themselves without having to be attached to a host program.
147
Trojan program
contains code intended to disrupt a computer, network, or Web site, and it is usually hidden inside a popular program. Users run the program, unaware that the malicious program is also running in the background.
148
logic bomb
a type of Trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time (sometimes the birthday of a famous person) or by a specific event, such as a user pressing the Enter key or running a certain program.
149
backdoor
(also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.
150
blended threat
a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
151
rootkit
is a series of software tools that enable an unauthorized user to gain access to a computer or network system without being detected
152
denial of service
attack floods a network or server with service requests to prevent legitimate users’ access to the system.
153
social engineering
takes advantage of the human element of a security system to trick others into revealing private information.
154
cryptojacking
where hackers secretly use the computing power of a user in order to mine cryptocurrency.
155
biometeric security measures
use a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.
156
callback modems
verifies whether a user’s access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number.
157
firewalls
a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked.
158
intrusion detection system
an protect against both external and internal access. It is usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources.
159
physical security measures
primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.
160
access controls
designed to protect systems from unauthorized access in order to preserve data integrity.
161
passwords
a combination of numbers, characters, and symbols that is entered to allow access to a system.
162
VPN
A virtual private network (VPN) provides a secure “tunnel” through the Internet for transmitting messages and data via a private network
163
data encryption
transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others.
164
Secure Sockets Layer (SSL)
a commonly used encryption protocol that manages transmission security on the Internet.
165
Transport Layer Security (TLS)
a cryptographic protocol that ensures data security and integrity over public networks, such as the Internet.
166
PKI (public key infrastructure)
enables users of a public network such as the Internet to securely and privately exchange data through the use of a pair of keys—a public one and a private one—that is obtained from a trusted authority and shared through that authority.
167
Asymmetric encryption
uses two keys: a public key known to everyone and a private or secret key known only to the recipient. A message encrypted with a public key can be decrypted only with the same algorithm used by the public key and requires the recipient’s
168
symmetric encryption
(also called secret key encryption), the same key is used to encrypt and decrypt the message. The sender and receiver must agree on the key and keep it secret.
169
CERT
The Computer Emergency Response Team (CERT) was developed by the Defense Advanced Research Projects Agency (part of the Department of Defense) in response to the 1988 Morris worm attack, which disabled 10 percent of the computers connected to the Internet. Many organizations now follow the CERT model to form teams that can handle network intrusions and attacks quickly and effectively. Currently, CERT focuses on security breaches and DoS attacks and offers guidelines on handling and preventing these incidents. CERT also conducts a public awareness campaign and researches Internet security vulnerabilities and ways to improve security systems. Network administrators and e-commerce site managers should check the CERT Coordination Center for updates on protecting network and information resources.
170
zero trust security
requires every person and every device that accesses a network must be secured regardless if it is within the organization or outside of it.
171
business continuity planning
outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.