Security
Knowledge Management
Data
Networking
Hardware
100

Protecting an organization’s information and information systems from unauthorized access, use,disclosure, disruption, modification, or destruction.

Information security

100

A set of core data, such as customer, product,employee, vendor, geographic location, and so on, that span an enterprise’s information systems.

Master Data

100

A binary digit that is, a 0 or a 1.

Bit

100

The transmission capacity of a network, stated in bits per second.

bandwidth

100

a handheld hardware input device that controls a cursor in a GUI

Computer Mouse

200

Malicious software such as viruses and worms.

Malware

200

A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.

Normalization

200

A group of eight bits that represents a single character.

Byte

200

The transmission capacity of a communications medium faster than 4 Mbps

Broadband

200

the brains of the computer where most calculations take place

Central Processing Unit (CPU)

300

A private combination of characters that only the user should know.

Password

300

A grouping of logically related records. 

Table

300

Describes the classification of a relationship:one-to-one, one-to-many, or many-to-many.

Connectivity

300

Computers, such as users’ personal computers, thatuse any of the services provided by servers.

Clients

300

a type of connector commonly used for Ethernet networking

RJ45 Cable

400

An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail.

Phishing Attack

400

A process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization’s memory and that typically reside within the organization in an unstructured manner.

Knowledge Management

400

Precise descriptions of policies, procedures, or principles in any organization that stores and uses data to generate information.

business rules

400

Insulated copper wire; used to carry high-speed data traffic and television signals

coaxial cable

400

a device that incorporates either a fan or some other means to keep a hot component, such as a processor, cooled down

Heat Sink

500

A separate organizational localarea network that is located between an organization’s internalnetwork and an external network, usually the Internet.

Demilitarized Zone (DMZ)

500

A database operation that combines records from two or more tables in a database

Join Operation

500

A relationship that exists when two entities are associated. 

binary relationship

500

The system administered by the Internet Corporation for Assigned Names (ICANN) that assigns names to each site on the Internet.

domain name system (DNS)

500

a hardware component, typically a circuit board or chip, which is installed on a computer so that it can connect to a network

Network Interface Card

M
e
n
u