Quiz 5 (Vocab 9-10) Flashcards

1
Q

Criminal activities carried out by means of computers or the internet.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intending or intended to do harm.

A

Malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.

A

Deepfakes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unathorized to do so.

A

Data Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality, Integrity and Availability

A

CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A simulated experience that can be similar to or completely different from the real world. Applications include entertainment, education and business

A

Virtual Reality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Knowledge, skills, and abilities an individual gains through experience that is often difficult to put into words.

A

Tacit Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is also known as “on-demand software” and Web-based/Web-hosted software.

A

Software as a Service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Organizations that work together on research to achieve the common goal- example universities and business, Mayo Clinic, Medtronic, Optum & UM (diabetes research)

A

Shared Research Collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The collection of methods relating to creating, sharing, using and managing the knowledge and information of an organization. It refers to a multidisciplinary approach to achieve organizational objectives by making the best use of knowledge.

A

Knowledge Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Individuals within the same team or company working together on a project to achieve certain business objectives

A

Internal Collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Knowledge sharing that occurs outside of an enterprise

A

External Collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To bring individuals, agencies, organizations and community members themselves together in an atmosphere of support to systematically solve existing and emerging problems that could not easily be solved by one group alone.

A

Communities Collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The action of working with someone to produce or create something.

A

Collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An interactive experience of a real-world environment where the objects that reside in the real world are enhanced by computer-generated perceptual information, sometimes across multiple sensory modalities, including visual, auditory, haptic, somatosensory and olfactory

A

Augmented Reality

17
Q

A form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.

A

Ransomware

18
Q

A person or group who gains unauthorized access to computer files or networks in order to further social or political ends.

A

Hacktivist

19
Q

Methods and processes used by organizations to manage risks and seize opportunities related to the achievement of their objectives.

A

Enterprise Risk Management (ERM)

20
Q

The use of cyber attacks against a nation-state, causing it significant harm, up to and including physical warfare, and disruption of vital computer systems.

A

Cyberwarfare