Test 2 Flashcards
A set of rules specifying the legal and ethical use of a system and the consequence of non compliance
Acceptable use policy
Refers to the issues involving both the users and the organizations responsibilities and liabilities
Accountability
A method for binding all the parties to a contract
Nonrepudiation
An unsolicited email sent for advertising purposes
Spam
Small text files with unique ID tags that are embedded in a wb browser and saved on the users hard drive.
Cookies
Generated by the web server software to record a users actions on a web site
Log Files
A legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for creations of the mind. Developed by people or businesses
Intellectual property
Information technology and internet have created what? Due to computers not being affordable for many people.
Digital divide
Networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so they can share skills and costs and have access to each other’s markets.
Virtual organizations
A software that secretly gathers information about users while they browse the web.
Spyware
A form of spyware that collects information about the user (without the users consent) to determine which advertisements to display in the users web browser.
Adware
Sending fraudulent emails that seem to come from a legitimate source such as a bank or university.
Phishing
Monitor and record keystrokes and can be software or hardware devices
Keystroke loggers
An attempt to gain access to a network by posing as an authorized user in order to find sensitive information such as passwords and credit card info.
Spoofing
Directing internet users to fraudulent websites with the intention of stealing their personal information.
Pharming.
The unauthorized use of computer data for personal gain.
Computer fraud.
A system must prevent disclosing information to anyone who is not an authorized user. This is called what?
Confidentiality
Systems ensure availability in the event of a system failure by using a combination of hardware and software
Fault-tolerant
This backup power unit continues to provide electrical power in the even of blackouts and other power interruptions.
Uninterruptible power supply (UPS)
A collection of disk drives used to store data in multiple places. If one drive fails in this system data stored on it can be reconstructed from data stored on remaining drives.
Redundant array of independent disks (RAID)
Use two disks containing the same data and can be a suitable RAID system for a small organization.
Mirror Disks
Consists of self propagating program code that is triggered by a specified time or event.
Virus
Travels from computer to computer in a network but it does not usually erase. They are independent programs that can spread themselves without having to be attached to a host program.
Worm
A type of Trojan program used to release a virus, work or other destructive code.
Logic bomb
Enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.
Backdoor
Attack floods a network or server with service requests to prevent legitimate users access to the system
Denial-of-service (DOS)
Means using people skills such as being a good listener to trick people into revealing private information
Social engineering
Security measures which use a physiological element that’s unique to a person and cannot be stolen.
Biometric security.
A combination of hardware and software that acts as a filter or barrier between a private network and external networks including internet.
Firewall
Protects against both internal and external access. Usually placed in front of a firewall and can identify attack signatures and cause routers to terminate connections with suspicious sources.
Intrusion detection system (IDS)
Corner bolts, electronic trackers, and identification badges are common what?
Physical computer network security measures.
Provides a secure tunnel through the internet for transmitting messages and data via a private network.
Virtual private network (VPN)
Transforms data called plaintext or clear text into a scrambled form called ciphertext that cannot be read by others.
Data encryption.
The electronic transfer of data from one location to another
Data communication
The amount of data that can be transferred from one point to another in a certain time period.
Bandwidth
The loss of power in a signal as it travels from the sending device to the receiving device
Attenuation
Multiple pieces of data are sent simultaneously to increase the transmission rate
Broadband data transmission
Voice grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred in a specific period of time.
Narrowband
Rules that govern data communication including error detection, message length and transmission speed
Protocols
A common carrier service, is a high speed service that uses ordinary phone lines.
Digital subscriber line (DSL)
All processing is done at one central computer
Centralized processing system
Maintains central control and decentralized operations. Processing power is distributed among several locations.
Distributed processing
A seven layer architecture for defining how data is transmitted from computer to computer in a network.
Open systems interconnection (OSI)
Connects workstations and peripheral devices that are in close proximity
Local area network (LAN)
Can span several cities, states, or even countries and it is usually owned by several different parties.
Wide area network (WAN)
Consists of a central computer and a series of nodes connected to it.
Star topology
Computers and devices are arranged in a circle so each node is connected to two other nodes.
Ring topology
Connects nodes along a network segment but the ends of the cable are not connected as they are in a ring topology
Bus topology