IT Vocab 11 Flashcards
Any software where the publisher retains intellectual property rights to the source code
Proprietary Software
Works whose copyrights have expired and are free for anyone to reproduce, display, and make derivatives
Public Domain
The crime of using someone else’s intellectual property in a way that should be reserved for the copyright holder
Piracy
Software where anyone can inspect, enhance, and modify the source code
Open-source software
A project management process that divides a large or complex project into smaller, more manageable projects that can be completed as part of an incremental or iterative process
Agile Methodologies
A reasonable belief that personal information collected by an information system is controlled and protected, not shared or used beyond its original intent
Privacy Expectation
The identification, evaluation, and prioritization of risks followed by activities that minimize, monitor, and control the impact of the risk
Risk Management
An activity that involves integrating various computing systems and software applications to function together as a whole
Systems integration
The process of turning data points into useful information
Data Analytics
A license given by a government that provides inventors a temporary monopoly on their invention
Patent
The SDLC phase that involves monitoring and evaluating the new information system
Maintenance Phase
Attempting to secretively discover private information about a person, company, or other entity
Snooping
An exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public
Fair Use
The practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time
Project Management
The SDLC phase that involves studying existing information systems that are already in place and the requirements for new information systems
Analysis Phase
A systematic process for determining and addressing needs, or “gaps” between current conditions, and desired conditions, or “wants”
Needs Assessment
The use of deception to gain personal and/or private information for unlawful purposes
Social Engineering
The SDLC phase that involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project
Planning Phase
Any word, picture, or symbol that’s used to distinguish a good from other similar goods
Trademark
A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network
Wiretapping
The passive gathering of information about a potential victim
Reconnaissance
Tricking a victim into revealing sensitive information under false pretenses
Pretexting
Anything that is owned by a copyright holder
Intellectual Property
The SDLC phase that involves purchasing and installing new hardware and software, integrating the various systems components, and testing the operation of the new system
Implementation phase
Protections granted by the federal government to creators, writers, and investors regarding rights to reproduce, display, make derivatives of, sell, rent, or lend a work
Copyright
The SDLC phase that involves reviewing the system requirements document form the analysis phase and producing detailed specifications that cover all aspects of the system
Design phase