WEEK 11 FINALS Flashcards

1
Q

This are facts, text, images, sound or video that may or may not be useful for a particular task for a particular organization.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It can take various forms, such as numbers, text, images, or any other type of input that can be encoded for processing.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data values stored for an object should be the correct values. data reflects the true and reliable state

A

Accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It contains the complete set of mandatory data items. (invalid, missing, unknown)

A

Complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It means information is readily available whenever it is needed.

A

Timely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is a uniformity of data stored from different locations. Do note that consistent data can still be wrong

A

Consistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information is easy to obtain or gain access to

A

Accessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

information provided should be related/suited to the purpose it is required.

A

Relevant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

information should be short and clear

A

Concise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

when properly managed, it becomes information and then knowledge.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is normally defined as data whose form and content are appropriate for a particular use.

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a combination of instincts, experiences, ideas, rules and procedures that guide actions and decisions.

A

Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the methods in converting data to knowledge

A

Summarizing
Formatting
Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is one of the important tasks for an IT department of any organization since IT applications cannot be done without having the right data.

A

Data Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Managing data is increasingly difficult due to the following factors:

A

-Most organizations require past data to be kept, while new data
need to be

  • Added rapidly. Thus, the amount of data required increases exponentially with time.
  • Most organizations also require an ever-increasing amount of external data.
  • Data in most organizations are not stored centrally. They are collected by many individuals and departments and stored at various locations.
  • Some of the data are not even available in digital format.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It is a process of collecting data from the data source

A

Data Collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the 3 different data source

A

Internal Data Source
External Data Source
Personal Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is located within the organization and normally captured by the organizations information systems and stored in the database or physical files.

A

Internal Data Source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This are data about other organizations, especially our competitors. This data can be obtained from the organizations websites, annual reports and published brochures

A

External Data Source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This are data that belong to individuals within an organization.

A

Personal Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is a collection of data organized to serve one or more application systems

A

Data Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the management of data inside a database is done by a software called ?

A

Data Base Management System (DBMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It acts as an interface between application systems and the database

A

Data Base Management System (DBMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Most popular type of DBMS, data are stored by using two dimensional tables.

A

Relational DBMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Data are organized into a tree-like structure. The data are stored as records which are connected to one another through links.

A

Heirarchical DBMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Database that subscribes to a model with information represented by objects.

A

Object Oriented DBMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

It is a repository of all of the data needed by the an organization.

A

Data Warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Data are stored by subjects

A

Data Warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The Data are stored by using similar method of coding

A

Data Warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Data are kept for a long time so that they can be used for forecasting and comparisons.

A

Data Warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Data are stored in a multi-dimensional structure so that data can be viewed and analyzed from different perspectives.

A

Data Warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The process of developing this is done by extracting data from all possible data sources

A

Data Warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

It is a subset of a Data Warehouse

A

Data Mart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Once the data are stored inside the data warehouse or data marts, they can be analyzed.

A

Data Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

It is one of the most important techniques for data analysis that focuses on modelling and knowledge discovery.

A

Data Mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Data mining techniques can be used to:

A

Automatically predict trends and behaviors
Automatically discover previously unknown patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Information is easier to understand if it is represented graphically.

A

Data Visualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

An example of data visualization tool is ________.

A

Graphical Information System (GIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

It is basically a computer-based system for capturing, checking, integrating, manipulating and displaying digitized maps.

A

Graphical Information System (GIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Another type of this is the virtual reality (VR), which enables people to share and interact in the same artificial environment.

A

Data Visualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

It is a technique that can be used for developing a level of understanding of the interaction of a system.

A

Modelling and Simulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

It is a simplified representation of a system in order to promote understanding of the real system.

A

Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

It is the manipulation of a model in such a way that it enables one to perceive the behavior of the system.

A

Simulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Business Intelligence includes:

A

Reporting (KPIs, Metrics)
Automated Monitoring
OLAP
Dashboards
Scorecards
Ad Hoc query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A broad category of applications and technologies for gathering, storing, analyzing, sharing and providing access to data to help enterprise users make better business decisions.

A

Business Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Refer to computer-based techniques used in spotting, digging-out and analyzing business data

A

Business Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

It can generally answer the questions: what happened; how many; how often; where exactly is the problem; what actions are needed.

A

Business Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

It enables data to be analyzed in order to produce reports, predictions and alerts.

A

Business Intelligence Software Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

These tools can also display information in graphical presentations.

A

Business Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are the components of DMS

A

Metadata
Capture
Storage
Indexing
Retrieval
Integrationm
Distribution
Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The description of a document. It may, for example, include the date the document was stored and the identity of the user storing it. The DMS may extract _______ from the document automatically or prompt the user to add metadata.

A

Meta data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Images of documents are normally captured by using scanners. Scanner software normally comes together with Optical Character Recognition (OCR) software, in order to convert digital images into machine readable text.

A

Capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

_____ of the documents often includes management of those same documents; where they are stored, for how long, migration of the documents from a storage media to another.

A

Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

is the process of extracting important words from the documents’ contents. ________ exists mainly to support retrieval.

A

Indexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

______ the electronic documents from the storage.

A

Retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Many DMS attempt to integrate document management directly into other applications, so that users may retrieve existing documents directly from the document management system repository, make changes, and save the changed document back to the repository as a new version, all without leaving the application.

A

Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A published document for _________ has to be in a format that cannot be easily altered.

A

Distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

It is is vital in many document management applications. Compliance requirements for certain documents can be quite complex depending on the type of documents.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

is a process of identifying, selecting, organizing, disseminating, transferring and applying important information, expertise and experience that are part of the organization

A

Knowledge Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

is a system to help in the process of knowledge management.

A

Knowledge Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What are the two types of knowledge

A

Tactic knowledge
Explicity knowledge

62
Q

is a type of knowledge that is not documented, but exists in the form of experiential learning of the organization

A

Tactic Knowledge

63
Q

is the type of knowledge that has been documented in the form that it can be distributed to others.

A

Explicit Knowledge

64
Q

What is the Technology to support knowledge management is called?

A

Knowware

65
Q

is an integrated knowledge management system that combines communication, collaboration and storage technologies into one complete system.

A

Knowledge management Suite

66
Q

What are the 6 Important Function of KMS?

A

(a) To help in the process of knowledge creation;

(b) To capture new knowledge and to represent it properly;

(c) To capture human insights in order to refine available knowledge;

(d) To store knowledge in a knowledge repository so that it can be accessed by members of the organisation;

(e) To update the knowledge so that it remains relevant and current;

(f) To disseminate
knowledge so that it can be shared by everybody in the organisation.

67
Q

What are the types of threats (Unintentional Threats)

A

Human Error
Environmental Hazards
Computer System Failure
Theft of Data/ Equipment
Software Attacks
Internet Fraud

68
Q

This remain a vulnerable link in the security chain. Human error often plays a crucial role in falling victim to phishing attacks. Phishing relies on tricking individuals into revealing sensitive information such as usernames, passwords, or financial details.

A

Human Error

69
Q

Lack of cybersecurity education and awareness can lead individuals to inadvertently engage in risky behavior. This includes clicking on suspicious links, downloading malicious files, or unknowingly sharing sensitive information.

A

Insufficient Training and Awareness

70
Q

Events such as earthquakes, floods, hurricanes, tornadoes, or wildfires can cause physical damage to data centers, servers, and networking equipment. This damage may lead to service disruptions, data loss, and prolonged downtime.

A

Environmental hazards

71
Q

Power disruptions, whether caused by natural disasters, accidents, or technical failures, can impact the availability and reliability of computer systems. Unexpected power outages may lead to data corruption, loss of transactions, and potential security vulnerabilities.

A

Power Outages

72
Q

System failures, whether due to hardware malfunctions or software bugs, can lead to downtime and disrupt services. During these periods, organizations may be more susceptible to security threats, as normal security controls and monitoring may be compromised or unavailable.

A

Computer System Failure

73
Q

Intruders may gain access to computer systems or networks to steal sensitive data. This could involve exploiting vulnerabilities, using stolen credentials, or conducting sophisticated cyber attacks.

A

Theft of Data/ Equipment

74
Q

Devices such as laptops, smartphones, servers, or external storage devices can be physically stolen. This can result in the loss of both the device and any data stored on it.

A

Physical Theft

75
Q

cyber attacks, are malicious activities carried out by individuals or groups with the intent to compromise the security, integrity, or availability of computer systems, networks, or data. These attacks exploit vulnerabilities in software applications, operating systems, or other digital components.

A

Software Attacks

76
Q

Victims are asked to pay a fee upfront with the promise of a larger reward in the future. Common examples include lottery scams and inheritance scams.

A

Internet Fraud

77
Q

Perpetrators build romantic relationships online and then exploit their victims emotionally and financially.

A

Romance Scams:

78
Q

Cybercriminals steal and misuse personal information, such as Social Security numbers, credit card details, or bank account information, to commit fraud.

A

Stolen Personal Information

79
Q

It can be defined as criminal activity involving an information technology infrastructure.

A

Computer Crimes

80
Q

It can be carried out either by outsiders or insiders.

A

Computer Crimes

81
Q

What is an an outsider who penetrates a computer system is called

A

Hacker

82
Q

it is a term used to describe a malicious hacker, who penetrates a computer system in order to commit a crimes.

A

Cracker

83
Q

What are the types of Attackers

A

Amatuers
Hackers
Organized Hackers

84
Q

These people are sometimes called Script Kiddies. They are usually attackers with little or no skill, often using existing tools or instructions found on the Internet to launch attacks.

A

Amateurs

85
Q

This group of attackers break into computers or networks to gain access. Depending on the intent of the break-in, these attackers are classified as white, gray, or black hats.

A

Hackers

86
Q

These hackers include organizations of cyber criminals, hacktivists, terrorists, and state-sponsored hackers.

A

Organized Hackers

87
Q

Some of them are just curious, while others are trying to demonstrate their skills and cause harm. They may be using basic tools, but the results can still be devastating. Script kiddies are individuals with limited technical skills who use pre-written scripts or tools to launch attacks. They often lack in-depth knowledge and may target systems opportunistically.

A

Amatuers

88
Q

usually groups of professional criminals focused on control, power, and wealth. The criminals are highly sophisticated and organized, and they may even provide cybercrime as a service to other criminals.

A

Organized Hackers

89
Q

make political statements to create awareness to issues that are important to them.

A

Hacktivist

90
Q

attackers gather intelligence or commit sabotage on behalf of their government. These attackers are usually highly trained and well-funded, and their attacks are focused on specific goals that are beneficial to their government.

A

State Sponsored Hackers

91
Q

They are also known as an ethical hacker, is an individual who uses their skills in computer security to identify and address vulnerabilities in computer systems, networks, and applications. White hat hackers work with the permission of the system owner to improve security and protect against potential cyber threats.

A

White Hat Hackers

92
Q

hackers that exploit vulnerabilities in computer systems, networks, or applications for personal gain, financial motives, or to cause harm. Their activities are typically illegal and unethical, and they may be involved in various cybercrimes.

A

Black Hat Hackers

93
Q

A gray hat hacker is someone who falls in between the categories of ethical “white hat” hackers and potentially malicious “black hat” hackers. Gray hat hackers may engage in activities that are not strictly authorized, but their intentions are not purely malicious. They might discover and exploit security vulnerabilities without permission, but their goal is often to raise awareness and prompt improvements in cybersecurity rather than causing harm or personal gain.

A

Grey Hat Hackers

94
Q

Types of Organzied Hackers

A

Cyber Criminals
Hacktivits
State sponsored attackers

95
Q

allows the attacker to take control over a device without the user’s knowledge. With that level of access, the attacker can intercept and capture user information before relaying it to its intended destination.

A

MitM (Man-in-the-middle)

96
Q

This attacks are widely used to steal financial information.

A

MitM (Man-in-the-middle)

97
Q

Many malware and techniques exist to provide attackers with ______ capabilities

A

MitM (Man-in-the-middle)

98
Q

It is Short for Malicious Software

A

Malware

99
Q

is any code that can be used to steal data, bypass access controls, or cause harm to, or compromise a system. designed to harm, exploit, or compromise computer systems, networks, or devices.

A

Malware

100
Q

It can take various forms, and its objectives range from stealing sensitive information to disrupting the normal operation of a system

A

Malware

101
Q

What are the symptoms of malware

A

Increase CPU Usage
Decrease CPU Speed
Email Sent w/o Consent
Unknown File Presence
Computer Freezes/ Crashes
Files Deleted/ Modified
Unknown Process Running
Network Connection Probem

102
Q

Some types of malware, such as crypto-mining malware, may cause a significant increase in CPU usage. This occurs when the malware uses the infected system’s computational resources to mine cryptocurrency, resulting in higher CPU utilization and slower system performance

A

Increase CPU Usage

103
Q

Malware or unwanted programs can negatively impact system performance, leading to a decrease in CPU speed. This can manifest as slower response times, delays in executing commands, and overall sluggishness.

A

Decrease CPU Speed

104
Q

Emails being sent from your account that you did not initiate or are unaware of. Malware may access and manipulate your contacts, adding or modifying entries.

A

Email Sent w/o Consent

105
Q

Determine where the file came from. Check recent downloads, email attachments, or any external storage devices you may have connected to your computer.

A

Unknown File Presence

106
Q

is an access attack that attempts to manipulate individuals into performing actions or divulging confidential information.

A

Social engineering

107
Q

They often rely on people’s willingness to be helpful but also prey on people’s weaknesses.

A

Social engineers

108
Q

This is when an attacker calls an individual and lies to them in an attempt to gain access to privileged data. An example involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.

A

Pretexting

109
Q

This is when an attacker quickly follows an authorized person into a secure location.

A

Tailgating

110
Q

It also known as piggybacking.

A

Tailgating

111
Q

This is when an attacker requests personal information from a party in exchange for something, like a free gift.

A

Something for Something (Quid pro quo)

112
Q

Is the process of discovering the password used to protect a wireless network.

A

Wifi Password Cracking

113
Q

A fraudulent email disguised as being from a legitimate trusted source

A

Phishing

114
Q

An attack from this results in some sort of interruption of network service

A

Denial of Service (DoS)

115
Q

Similar to a DoS attack but orginates from multiple, coordinated sources.

A

Disrupted DoS (DDoS)

116
Q

Increase traffic to malicious sites that may host malware or perform social engineering.

A

SEO Poinsoning

117
Q

Attacks that use multiple techniques to compromise a target.

A

Blended attack

118
Q

Wifi passwords cracking can be achieved thru:

A

Social engineering
Brute-force attacks
Network sniffing
Wi-Fi password cracking
Phishing
Denial-of-Service (DoS)
SEO Poisoning

119
Q

The attacker manipulates a person who knows the password into providing it.

A

Social engineering

120
Q

The attacker tries several possible passwords in an attempt to guess the password. Brute-force attacks usually involve a word-list file

A

Brute-force attacks

121
Q

By listening and capturing packets sent on the network, an attacker may be able to discover the password if the password is being sent unencrypted (in plain text).

A

Network sniffing

122
Q

is the process of discovering the password used to protect a wireless network.

A

Wi-Fi password cracking

123
Q

is when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source. The message intent is to trick the recipient into installing malware on their device, or into sharing personal or financial information.

A

Phishing

124
Q

attacks are a type of network attack. A DoS attack results in some sort of interruption of network service to users, devices, or applications.

A

Denial-of-Service (DoS)

125
Q

The most common goal of this is to increase traffic to malicious sites that may host malware or perform social engineering.

A

SEO Poisoning

126
Q

To force a malicious site to rank higher in search results, attackers take advantage of popular search terms.

A

SEO Poisoning

127
Q

SEO poisoning is also known as?

A

Search Engine Poisoning

128
Q

It is a cyber attack technique that involves manipulating search engine results to drive traffic to malicious websites.

A

SEO Poisoning

129
Q

is a process where a criminal poses as someone else

A

Identity Theft

130
Q

Using another’s identity to obtain goods and services

A

Financial Identity Theft

131
Q

Pretending to be another person when apprehended for a crime

A

Criminal Identity Theft

132
Q

Using another’s information to assunme his/her identity in daily life

A

Identity Cloning

133
Q

Using another’s business name to obtain credit.

A

Business Identity Theft

134
Q

What are the ways to protect your computing device?

A

Keep Firewall On
Use Antivirus and Antispyware
Update and Install Patches
Encrypt Data
Authentication and Authorization
Back Up Data
Don’t Share much on Social Media
OAuth

135
Q

acts as a barrier between your computer or network and the internet, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules.

A

Firewall

136
Q

software helps protect your computer from various types of malicious software, commonly known as malware. Malware includes viruses, worms, trojan horses, ransomware, spyware, adware, and other types of harmful software that can compromise the security and functionality of your computer.

A

Antivirus and Antispyware

137
Q

fingerprint, palm print, as well as facial or voice recognition

A

Biometric scan

138
Q

Two Factor Authentication - Physical object - credit card, ATM card, phone, or fob

A

Authentication and Authorization

139
Q

It converts plain text into unreadable, encoded text, and the original data can only be restored with the proper decryption key.

A

Encryption

140
Q

Software developers regularly release updates and patches to address vulnerabilities, enhance features, and improve overall performance.

A

Update and Install Patches

141
Q

is an open standard protocol that allows an end user’s credentials to access third party applications without exposing the user’s password. OAuth acts as the middle man to decide whether to allow end users access to third party applications

A

Oauth - Open Authorization (OAuth)

142
Q

Ways of protecting Information Resources

A

System Control
Data Control
Application Control

143
Q

Physical protection of the computer hardware from being stolen;

A

System Control

144
Q

Restriction of unauthorized access to computer system;

A

System Control

145
Q

Establishment of firewall to protect the access to the local network; and

A

System Control

146
Q

Installation of antivirus software.

A

System Control

147
Q

Data safety and data security.

A

Data Control

148
Q

Enforcement of regular backup;

A

Data Control

149
Q

Plan for disaster recovery;

A

Data Control

150
Q

Restriction of access to data center.

A

Data Control

151
Q

are meant to protect specific applications from unauthorized or illegal access.

A

Application Control