Chapter 4
Chapter 5
Chapter 6
Misc 1
Misc 2
100
All of the processes and policies designed to protect an organization’s information and information systems
What is Information Security
100
a set of programs that provide users with tools to create and manage a database.
What is a Database Management System (DBMS)
100
a system that connects computers and other devices (e.g., printers) via communications media so that data and information can be transmitted among them
What is a computer network
100
Any network external to your organization
What is a untrusted network
100
To identify, control and minimize the impact of threats.
What is risk management
200
Any danger to which a system may be exposed
What is a threat
200
a diagram that represents entities in the database and their relationships
What is a data model
200
connects two or more devices in a limited geographical region, usually within the same building, so that every device on the network can communicate with every other device
What is a local area network (LAN)
200
a computer program that hides in another computer program and reveals its designated behavior only when it is activated
What is a trojan horse
200
A private network that uses a public network (usually the Internet) to connect users.
What is a VPN virtual private network
300
The possibility that the system will suffer harm by a threat
What is a vulnerability
300
a repository of historical data that are organized by subject to support decision makers in the organization.
What is a data warehouse
300
the protocol of the Internet
What is Transmission Control Protocol/Internet Protocol (TCP/IP)
300
Copying a software program without making payment to the owner
What is piracy
300
information that is contextual, relevant, and useful.
What is knowledge
400
When the attacker watches another person’s computer screen over that person’s shoulder
What is shoulder surfing
400
process that helps organizations manipulate important knowledge that comprises part of the organization’s
What is knowledge management
400
refers to any learning situation in which teachers and students do not meet face-to-face.
What is distance learning (DL)
400
Intellectual work, such as a business plan, that is a company secret and is not based on public information
What is a trade secret
400
a communications processor that routes messages from a LAN to the Internet, across several connected LANs, or across a wide area network such as the Internet.
What is a router
500
an attack where the attacker uses social skills to trick a legitimate employee into providing confidential company information
What is social engineering
500
a collection of interrelated two-dimensional tables, consisting of rows and columns.
What is a relational database
500
the use of electronic communication technology that enables two or more people at different locations to hold a conference.
What is teleconferencing
500
collects personal information about users without their consent
What is spyware
500
is a company that provides Internet connections for a fee.
What is Internet service provider (ISP)
M
e
n
u