4-6
4-6
4-6
4-6
4-6
100
controls that restrict anauthorized indiviuals from using information resources and are concerned with user identification
Access controls
100
typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any securitys procedures.
back door
100
unsolicited e-mail
spam
100
the transmition capacity of a network , stated in bits per second
bandwidth
100
software applications
browsers
200
alien software designed to help pop up advertisements appear on your screen
adware
200
the harm loss or damage that can result if a threat compromises
exposure
200
a binary digit-that is 0-1
bit
200
a common local area network protocol
ethernet
200
the name assigned to an internet site
domain names
300
an examination of information systems, their inputs, outputs, and processing
audit
300
the right to be left alone and to be free of unreasonable personal intrusion
piracy
300
a grouping of logically related fields; describes an entity
record
300
a network that connects parts of the intranets of different organizations
extranet
300
a web-based gateway to information and knowledge for an entire industry
industrywide portal
400
a process that determines the identity of the person requiring access
authentication
400
any danger to which an information resource may be exposed
threat
400
a grouping of logically related records
table
400
computers such as users
clients
400
high speed central networks
backbone networks
500
clandestine software that is installed on your computer through duplicitious methods.
alien software
500
the likelyhood threat that a threat will occur
risk
500
the identifier field or attribute that uniquely identifies a record.
primary key
500
insulated copper wire, used to carry high-speed data traffic and telivision signals
coaxial cable
500
learning portals
distant learning
M
e
n
u