The degree of protection against criminal activity, danger, damage, and/or loss
What is Security?
An approach to managing information across an entire organization involving a formal set of unambiguous rules for creating, collecting, handling, and protecting its information.
What is Data Governance?
A repository of historical data that are organized by subject to support decision makers in the organization.
What is a Data Warehouse?
Refers to the transmission capacity of a network; it is stated in bits per second
What is Bandwidth?
The underlying concept defining the structure of the World Wide Web
What is Hypertext?
All of the processes and policies designed to protect an organization’s information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction
What is Information Security?
A set of core data (e.g., customer, product, employee, vendor, geographic location, etc.) that span the enterprise information systems.
What is Master Data?
A low-cost, scaled-down version of a data warehouse that is designed for the end-user needs in a strategic business unit (SBU) or an individual department
What is a Data Mart?
A communications processor that routes messages from a LAN to the Internet, across several connected LANs, or across a wide area network such as the Internet.
What is a Router?
Search several engines at once and then integrate the findings to answer users’ queries.
What are Metasearch Engines?
An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
What is Social Engineering?
The same data are stored in multiple locations.
What is Data Redundancy?
The cumulative store of subjective or experiential learning. In an organization, tacit knowledge consists of an organization’s experiences, insights, expertise, know-how, trade secrets, skill sets, understanding, and learning. It is generally imprecise and costly to transfer.
What is Tacit Knowledge?
High-speed central networks to which multiple smaller networks (such as LANs and smaller WANs) connect.
What are Corporate backbone networks?
The process in which highly prized “knowledge” workers are now able to work anywhere and anytime.
What is Telecommuting?
Occurs when an unauthorized individual attempts to gain illegal access to organizational information
What is espionage/trespass?
Applications and data are independent of one another; that is, applications and data are not linked to each other, so all applications are able to access the same data.
A collection of interrelated two-dimensional tables, consisting of rows and columns.
What is a Relational Database?
Discrete pulses that are either on or off, representing a series of bits (0s and 1s). Th is quality allows digital signals to convey information in a binary form that can be interpreted by computers.
What are Digital Signals?
A process in which an organization outsources a task to an undefined, generally large group of people in the form of an open call.
What is Crowdsourcing?
Includes certain types of software that are not allowed to run in the company environment.
What is Blacklist?
A field in a database that uniquely identify each record so that it can be retrieved, updated, and sorted.
What is a Primary Key?
Refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity
What is Cardinality?
A type of client/server distributed processing where each computer acts as both a client and a server
The latest form of videoconferencing which enables participants to seamlessly share data, voice, pictures, graphics, and animation by electronic means
What is Telepresence?