Information Security
Information Security
Data
Telecommunications & Networking
100
adware
What is Alien software designed to help pop-up advertisements appear on your screen
100
logic bombs
What is segments of computer code embedded within an organization's existing computer program
100
data file
What is a collection of logically related records
100
router
What is a communcations processor that routes messages from a LAN to the internet
200
authorization
What is a process that determines which actions, rights, or privileges the person has
200
bot
What is a computer that has been compromised by, and under the control of, a hacker
200
byte
What is a group of eight bits that represents a single character
200
Servers
What is Computers that provide access to various network services, such as printing, data, and communications
300
Cybercrime
What is illegal activities executed on the internet
300
threat
What is any danger to which information resource may be exposed
300
primary key
What is the identifier field or attribute that uniquely identifies a record
300
bandwidth
What is the transmission capacity of a network, stated in bits per second
400
Password
What is a private combination of characters that only the user should know
400
risk
What is the likelihood that a threat will occur
400
record
What is a group of logically related fields
400
digital signals
What is a discrete pulse
500
malware
What is Malicious software such as viruses and worms
500
risk management
What is a process that identifies, controls, and minimizes the impact of threats, in an effort to reduce risk to manageable levels
500
entity
What is a person, place, thing, or event
500
Internet Protocol address
What is an assigned address that uniquely identifies a computer on the Internet
M
e
n
u