Fundamentals Of Cyber Security 1 Flashcards
What is an attack (or threat) vector
An attack (or threat) vector is a path or tool that an attacker uses to target a
network.
The use of Web 2.0 apps in the enterprise is sometimes referred to as?
The use of Web 2.0 apps in the enterprise is sometimes referred to as
Enterprise 2.0, although not all Web 2.0 apps are considered to be Enterprise
2.0 applications.
Examples of accounting software include?
Examples of accounting software include Intacct, Microsoft Dynamics AX and GP, NetSuite,
QuickBooks, and Sage.
Business intelligence (BI) and business analytics software consists of?
- Business intelligence (BI) and business analytics software consists of tools and techniques used to surface large amounts of raw unstructured data from a variety of sources (such as data warehouses and data marts). BI and business analytics software performs a variety of functions, including business performance management, data mining, event processing, and predictive analytics. Examples of BI and analytics software include IBM Cognos, MicroStrategy, Oracle Hyperion, and SAP.
Customer relationship management (CRM) software
Customer relationship management (CRM) software is used to manage an organization’s
customer (or client) information, including lead validation, past sales, communication and
interaction logs, and service history. Examples of CRM suites include Microsoft Dynamics CRM, Salesforce.com, SugarCRM, and ZOHO.
Database management systems (DBMS)
Database management systems (DBMS) are used to administer databases, including the
schemas, tables, queries, reports, views, and other objects that comprise a database. Examples of DBMS software include Microsoft SQL Server, MySQL, NoSQL, and Oracle Database.
Enterprise resource planning (ERP) systems
Enterprise resource planning (ERP) systems provide an integrated view of core business
processes, such as product and cost planning, manufacturing or service delivery, inventory
management, and shipping and payment. Examples of ERP software include NetSuite, Oracle’s JD Edwards EnterpriseOne and PeopleSoft, and SAP.
Supply chain management (SCM) software
Supply chain management (SCM) software is used to manage supply chain transactions,
supplier relationships, and various business processes, such as purchase order processing,
inventory management, and warehouse management. SCM software is commonly integrated with ERP systems. Examples of SCM software include Fishbowl Inventory, Freightview, Information Supply Chain Management, and Sage X3.
Web content management (WCM) software
Web content management (WCM) software is used to manage website content, including
administration, authoring, collaboration, and publishing. Examples of web content management software include Drupal, IBM FileNet, Joomla, and WordPress.
Common Web 2.0 apps and services (many of which also are SaaS apps) include?
File sync
Instant messaging
Microblogging
Office Productivity Suites
Remote access software
Remote team meeting software
Social curation
Social networks
Web-based email
Consumerization: The process of consumerization occurs as end users increasingly find
personal technology and apps that are more powerful or capable, more convenient, less
expensive, quicker to install, and easier to use than enterprise IT solutions.
Consumerization: The process of consumerization occurs as end users increasingly find
personal technology and apps that are more powerful or capable, more convenient, less
expensive, quicker to install, and easier to use than enterprise IT solutions.
Bring your own device (BYOD):
Bring your own device (BYOD): Closely related to consumerization is BYOD, a policy trend in
which organizations permit end users to use their own personal devices, primarily smartphones and tablets, for work-related purposes. BYOD relieves organizations from the cost of providing equipment to employees but creates a management challenge because of the vast number and type of devices that must be supported.
Bring your own apps (BYOA):
Bring your own apps (BYOA): Web 2.0 apps on personal devices are increasingly being used for work-related purposes. As the boundary between work and personal lives becomes less distinct, end users are practically demanding that these same apps be available to them in their workplaces.
Mobile computing?
Mobile computing: The appetite for rapid, on-demand access to apps and data from anywhere, at any time, on any device is growing. There are approximately more than 8 billion mobile subscriptions worldwide, and total mobile monthly data traffic (including audio, file sharing, social networking, software uploads and downloads, video, web browsing, and other sources) is about 40 exabytes!
5G cellular wireless?
5G cellular wireless: Each new generation of wireless connectivity has driven many innovations, and the move to the fifth-generation of cellular wireless (5G) is well under way, with mobile network operators announcing 5G pilot trials and commercialization plans as they expand their geographic footprints.
The latest 5G applications are consumer-driven, help governments implement 5G for smart city rollouts, and bring 5G service experience to the public by seamlessly covering major sports events, among others. The promise of intelligent connectivity will drive massive adoption of the internet of things (IoT) and could transform industries.
We’re now describing the Enterprise of Things: networked industrial devices, sensors, networks, and apps that connect businesses. As today’s enterprises undergo digital transformation, they’ll be looking for 5G networks to drive true Industry 4.0 transformation, leveraging automation, artificial intelligence (AI), and IoT.