A network of computers that have been compromised by, and under control of, a hacker, who is called the botmaster
What is a botnet?
Each characteristic of quality of a particular entity.
What is an attribute?
A collection of logically related records
What is a data file?
A private network that uses Internet software and TCP/IP protocols
The chain of events linking planning to protection and to recovery
What is business continuity?
The most effective and efficient ways to do things
An approach to managing information across an entire organization
What is data governance?
The transmission capacity of a network, stated in bits per second.
Small amounts of information that Web sites store on your computer, temporarily or more or less permanently
What is a cookie?
A binary digit - that is, a 0 or a 1.
What is a bit?
A diagram that represents entities in the database and their relationships
What is a data model?
The transmission capacity of a communications medium faster than 4 Mbps
What is broadband?
Illegal activities executed on the Internet
What is cybercrime?
A group of eight bits that represents a single character
What is a byte?
A repository of historical data that are organized by subject to support the decision makers in the organization
What is a data warehouse?
Software applications through which users primarily access the Web
Controls that deal with the movement of data across networks.
What is communication controls?
Describes the classification of a relationship: one-to-one, one-to-many, or many-to-many
What is connectivity?
Any person, place, thing, or event of interest to a user
What is an entity?
Computers, such as users" personal computers, that use any of the services provided by servers
What are clients?