Module Six Flashcards
Define ‘notational system’ and give three examples.
A system used to represent different quantities or characters. (Decimal, binary, and hexadecimal).
Binary
Also called ‘base 2’.
Start with the number 1. Every place value to the left of one is multiplied times 2 (Bi meaning two).
Tell me four things about Hex (hexadecimal).
- A base of 16.
- Start with 1 then multiply times 16.
- Numbers larger than 9 are assigned letters. (A = 10, B = 11, C=12, D=13, E=14, F=15).
- Used in programming and Internet Protocol.
What is a ‘bit’?
The basic unit of computer data. Also called the ‘binary digit’.
How many bits in a ‘byte’?
8
How many bits in a ‘double byte’?
16
“KiloByte”
(KB) 1000 bytes.
Small files.
‘MegaByte’
(MB) One million bytes or 1000*1000. Many files.
‘GigaByte’
(GB) One billion. Disk capacity.
‘TeraByte’
(TB) One trillion bytes. Disk capacity or large storage networks.
‘PetaByte’
(PB) One thousand trillion. Quadrillion Used by the largest storage networks and cloud systems.
KibiByte
(KiB) 2^10 = 1024 bytes. Think 1,000.
MebiByte
(MiB) 1024*1024 = 1,048,576 bytes. Think one million.
GibiByte
(GiB) 102410241024. Think one billion.
Kibi, Mibi, Gibi.
Measuring storage and capacities in binary instead of decimal. 2*x instead of 10^x.
Throughput Rate
How fast data can be transferred between components in a computer or between computers in a network.
How is ‘throughput’ measured?
bps (bits per second). Always measured in base 10. It can also be measured in bytes (B), but this is much less common.
Kbps
Kb/s = 1000 bits.
1.Older computer peripheral interfaces (or buses).
2. Slow network links.
Mbps
Mb/s one million bits.
1. Internal computer interfaces.
2. Wireless networks.
3. Residential Internet links.
Gbps
Gb/s one billion bits. Current PC bus standards.
Tbps
Tb/s. Found in major telecommunications links between data centers, cities, and countries.
Hertz
(Hz) One cycle per second. A computers internal clock and the speed at which its processors work.
Megahertz
(MHz) One million cycles per second. Older PC bus interfaces and many types of network interfaces.
Gigahertz
(GHz) One billion cycles per second. Modern CPUs and but types plus fiber-optic network equipment work at these much faster speeds.
Two things about Integers.
- Whole numbers (e.g. 5, 21, or 65536).
- Consumes 1-8 bytes of computer storage.
Four things about Floating-point numbers.
- Decimals (e.g. 4.1, 7.62…)
- A whole number is also possible (e.g. 4.0).
- Called a ‘float’ for short.
- Consumes 4-8 bytes of storage.
Two things about Boolean Values.
- True or False (represented with a 1 or 0)
- Consumes a single bit of storage.
Three things about Characters.
- ‘char’ for short.
- Can be a letter, symbol, or even a number, however mathematical operations can not be performed on it.
- Consumes one byte of data.
Three things about Strings.
- A collection of characters (e.g. XYZ, Hello world, Apartment #101).
- No real storage limit.
- Generally, a string length should be defined when you define the data type. (e.g.
What are the two most common ways of presenting character set data?
- ASCII.
- Unicode.
Five things about ASCII.
- American Standard Code for Information Interchange.
- Designed in 1963.
- Represented by a seven bit binary number instead of an eight bit binary number.
- With seven bits you can express 128 different values (1-127).
- Nowadays ASCII can be extended to 256 values.
Name three Unicode character encoding standards.
- UTF-8 (used by many websites).
- UTF-16
- UTF-32
What is an asset.
Something of commercial value.
What is a ‘security control’?
A mechanism designed to protect an information asset or processing system.
Two things about ROSI.
- Return on Security Investment.
- Is the amount of money we spend on ROSI more or less than it would cost us to recover from data loss.
What is ‘data exfiltration’?
When an attacker removes data from your network without authorization.
What is a ‘data breach’?
When a network exposes private data publicly, whether the data is actively stolen or not.
Give three examples of ‘security control’.
- Backups.
- Access control.
- High availability.
Backup is an example of ‘security control’. Define ‘backup’.
Copies of data have been made and are easily and quickly available.
Access control is an example of ‘security control’. Define ‘access control’.
It’s self explanatory. Only people you want to have access to your data, have access to your date.
Name four types of ‘access control’.
- Permissions.
- Usage restrictions.
- Data encryption.
- Firewalls.
Explain ‘usage restriction’.
Rights management software controls what users can and can’t do with data files (e.g. You can allow specific users to read a file, but not to copy or print a file).
Explain ‘data encryption’.
This means that data is encoded in such a way that only someone with the correct key can read it. Even if someone obtained the encoded data they couldn’t read it without the key. Therefore Security Control would only have to protect the key itself, which is a small piece of data.
What is the difference between ‘encryption’ and ‘permission’?
Permission only works when the data is stored within an OS or network that “respects” the access control. If the data is transferred to another computer, the permission can be overridden. Encryption prevents this possibility. Most security systems use both permission and encryption.
Explain a ‘firewall’.
A firewall can control how hosts and network applications are accessible to one another.
Explain ‘high availability’.
Ensuring data is available in the event of one or several failures of hardware or software components within your infrastructure. Aka fault tolerance.
Tell me six things about ‘copyright’.
- If I create something, it’s automatically covered.
- Proof of ownership can be registered with the Copyright Office.
3.Copyright does not apply to.
a. An idea.
b. Names.
c. Phrases.
d. Titles. - It lasts 15-70 years after the owners death.
- If an employee creates something he has ownership, unless there is an employment clause saying otherwise (which there probably is).
- Examples of things that can be copyrighted are books, films, plays, computer software, games, and artwork.
Tell me four things about ‘trademark’.
- It’s for a name and/or logo.
- It must be distinctive.
- An ordinary trademark is indicated by the ™ symbol.
- A registered trademark is indicated by the ® symbol.
Tell me five things about a ‘patent’.
- A legal protection for some kind of invention.
- It can be an idea. Unlike with a copyright.
- Patents are registered for a limited time.
- There is no automatic protection.
- A patent must be applied for Internationally.
Tell me three things about ‘DRM’.
- Digital Rights Management.
- Pay-per-use for digital products.
- When a digital product is purchased, the vendor may license the file to be restricted to a certain number of devices.
Tell me six things about ‘digital product’.
- A product that is sold or distributed as binary computer data.
- Examples include software, games, ebooks, music, videos and etc.
- Low manufacturing and distribution costs.
- Expensive infrastructure costs.
- Easy to steal.
- DRM was created to protect digital products.
Define ‘analytics’.
The process of using data to generate information.
What is ‘data correlation’?
This means analyzing the whole data set and finding connections and links between data points.
Define ‘meaningful reporting’.
Meaningful reporting refers to informing human decision making at the insight layer, as the information identified by the analytics system is presented in ways that humans can analyze and interpret.