Illegal activities that are performed online.
cybercrime
software and/or hardware that functions as a protection blocking unwanted information that may harm a network.
firewall
An enormous amount of information.
Big Data
A wire that is made of copper that is insulated and used to transfer data and is widely known as one of the primary items to connect Televisions.
a coaxial cable
This protocol is used to shape and send pages across the Internet.
Hypertext Transport Protocol (HTTP)
A direct or indirect attack on information and/or computers that usually results in violence.
cyberterrorism
The act of coding information in a way that makes it hard for anyone else to decipher it other than the correct receiver.
encryption
This is where information that is alike in someway is stored.
a data file
A cable that is made up of glass strands that transfers data by using light.
a fiber-optic cable
Works as an address that every device connected to the Internet has.
an IP address
War against a country or countries usually caused by software.
cyberwarfare
A step or steps that verifies that the person trying to access the information is the correct person and not a fraud.
authentication
The act of taking care of a quantity of information that is spread over a company or organization.
data governance
A device that "routes" messages from and to local area networks across a small or large distance.
a router
The protocol that is used when a telephone call is sent from or received by the Internet.
Voice-over Internet Protocol (VoIP)
Software from a different source that can hide within a system and steal your information.
a spyware
A key that is used to access information.
a password
This is a reference point that gives information about anything that has to do with data.
a data dictionary
A cable that consists of wires twisted together in groups of two.
a twisted-pair wire
A reliable way of sending information over networks.
TCP/IP (Transmission Control Protocol/ Internet Protocol)?
The act of stealing someone else's information and posing as the victim, usually resulting in the ruin of someone's reputation.
identity theft
When a company specifically chooses certain software that can not be used within the company.
blacklisting
"Information technologies used to systematize, enhance, and expedite intra- and interfirm knowledge management."
Knowledge management systems
Computers that serve as a "gateway" to information and/or many services.
a server
Specific information and resources that are located on one place over the web of a person or business.
a Web site?