Types of network processing
knowledge management
information security
ch 4
100

a type of client/server distributed processing where each computer acts as both a client and a server.

what is peer-to-peer processing?

100

a process that helps organizations manipulate important knowledge that comprises part of the organization's memory 

what is Knowledge management?


100

the degree of protection against criminal activity, danger, damage, and/or loss

what is Security?
100

an attack in which the perpetrator uses social skills to track or manipulate legitimate employees into providing confidential company information

what is social engineering

200

links two or more computers in an arrangement

what is Client/server computing?

200

another term for knowledge

what is Intellectual capital (intellectual assets)

200

all the processes and policies designed to protect an organization's information and information systems from unauthorized access  

what is information security 

200

Accessing questionable web sites; can result in malware and/or alien software being introduced into the organization's network

what is careless internet surfing?

300

computing that leads to the ideas of "fat" and "thin" clients

what is Client/server computing

300

deals with more objective, rational, and technical knowledge

what is Explicit knowledge?

300

any danger to which a system might be exposed

what is a threat

300

losing or misplacing devises or using them carelessly so that malware is introduced into an organization's network 

what is carelessness with computing devices 

400

the three basic types of peer-to-peer processing

what is unused CPU power, person-to-person collaboration, and advanced search and file sharing?

400

the cumulative store if subjective or experiential learning

what is Tacit knowledge?

400

the harm, loss, or damage that can result if a threat compromises that resource

what is exposure 

400

when an attacker either threatens to steal or actually steals information form a company

what is Information extortion 

500

has no local storage and limited value when the network is not functioning

what are thin clients?

500

knowledge that has been codified in a form that can be distributed to others or transformed into a process or strategy 

what is explicit knowledge?

500

the system will be harmed by a threat 

what is vulnerability

500

deliberate acts that involve defacing an organization's web site, potentially damaging the organization's image  

what is sabotage or vandalism

M
e
n
u