About Information Security
Web Based Attacks of Today
The Data Base Approach
Big Data
Internet Connection Methods
100

Can be defined as the degree of protection against criminal activity, danger, damage, and/or loss.

What is Security?

100

Segment of computer code that performs malicious actions by attaching to another computer program.

What is a virus?

100

The same data are stored in multiple locations.

What is Data redundancy?

100

In computer data storage, a "blank" or logical drive is a single accessible storage area with a single file system, typically (though not necessarily) resident on a single partition of a hard disk.

What is Volume?
100

Still used in the United States where broadband is not available

What is Dial-up?

200

Following this broad definition, "blank" refers to all of the processes and policies designed to protect an organization’s information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction.

What is Information Security?

200

Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program).

What is a worm?

200

Applications cannot access data associated with other applications.

What is Data isolation?

200

The rate at which data flow into an organization is rapidly increasing.

What is Velocity?

200

Broadband access via telephone companies

What is DSL?

300

A "blank" to an information resource is any danger to which a system may be exposed.

What is a threat?

300

Phishing attacks target large groups of people. In "blank" phishing attacks, the perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information.

What is spear phishing?

300

Various copies of the data do not agree.

What is Data inconsistency?

300

Traditional data formats tend to be structured and relatively well described, and they change slowly. Traditional data include financial market data, point-of-sale transactions, and much more.

What is Variety?

300

Access over your cable TV coaxial cable. Can have degraded performance if many of your neighbors are accessing the Internet at once

What is Cable modem?

400

Refers to illegal activities conducted over computer networks, particularly the Internet. iDefense (http://labs.idefense.com), a company that specializes in providing security information to  governments and Fortune 500 companies, maintains that groups of well-organized criminal organiza tions have taken control of a global billion-dollar crime network.

What is Cybercrime?

400

Software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

What is a Trojan horse?

400

Data meet certain constraints; for example, there are no alphabetic characters in a Social Security number field.

What is Data integrity?

400

refers to inaccurate, incomplete, incorrect, duplicate, or erroneous data.

What is Dirty data?

400

Access where cable and DSL are not available

What is Satellite?

500

Is the possibility that the system will be harmed by a threat.

What is vulnerability?

500

A segment of computer code that is embedded within an organization’s existing computer programs and is designed to activate and perform a destructive action at a certain time or date.

What is a Logic bomb?

500

Applications and data are independent of one another; that is, applications and data are not linked to each other, so all applications are able to access the same data.

What is Data independence?

500

is accessible public data that individuals and organizations can use to create new businesses and solve complex problems. In particular, government agencies gather very large amounts of data, some of which is Big Data.

What is Open data?

500

Expensive and usually placed only in new housing developments

What is Fiber-to-the-home or (FTTH)?
M
e
n
u