a type of client/server distributed processing where each computer acts as both a client and a server.
what is peer-to-peer processing?
a process that helps organizations manipulate important knowledge that comprises part of the organization's memory
what is Knowledge management?
the degree of protection against criminal activity, danger, damage, and/or loss
an attack in which the perpetrator uses social skills to track or manipulate legitimate employees into providing confidential company information
what is social engineering
links two or more computers in an arrangement
what is Client/server computing?
another term for knowledge
what is Intellectual capital (intellectual assets)
all the processes and policies designed to protect an organization's information and information systems from unauthorized access
what is information security
Accessing questionable web sites; can result in malware and/or alien software being introduced into the organization's network
what is careless internet surfing?
computing that leads to the ideas of "fat" and "thin" clients
what is Client/server computing
deals with more objective, rational, and technical knowledge
what is Explicit knowledge?
any danger to which a system might be exposed
what is a threat
losing or misplacing devises or using them carelessly so that malware is introduced into an organization's network
what is carelessness with computing devices
the three basic types of peer-to-peer processing
what is unused CPU power, person-to-person collaboration, and advanced search and file sharing?
the cumulative store if subjective or experiential learning
what is Tacit knowledge?
the harm, loss, or damage that can result if a threat compromises that resource
what is exposure
when an attacker either threatens to steal or actually steals information form a company
what is Information extortion
has no local storage and limited value when the network is not functioning
what are thin clients?
knowledge that has been codified in a form that can be distributed to others or transformed into a process or strategy
what is explicit knowledge?
the system will be harmed by a threat
what is vulnerability
deliberate acts that involve defacing an organization's web site, potentially damaging the organization's image
what is sabotage or vandalism