Information Security
Hack Attack
Big Data
Knowledge
Networking
100

It refers to illegal activities conducted over computer networks, particularly the internet.

What is Cybercrime.

100

This hacking organization breeched Sony's network in 2015.

Who are the Guardians of Peace.

100

What is so large and complex that it is difficult to manage using traditional management systems.

What is Big Data.

100

This is a process that helps organizations manipulate important knowledge that comprises part of the organizations memory.

What is knowledge management.

100

This is a network that covers a large geographical area

What is a wide area network

200

This occurs when an unauthorized individual attempts to gain illegal access to organizational information.

What is espionage.

200

This is a software program that hides in other computer programs and reveals its designed behavior only when activated.

What is a Trojan Horse.

200

What is a repository of historical data that are organized by subject to support decision makers in the organization.

What is a Data Warehouse.

200

What is another way to describe knowledge in a business IT department

What is intellectual capital or intellectual assets.

200

This is a communication processor that routes messages from a LAN to the internet

What is a router

300

This is intellectual work that is a company secret and is not based on public information.

What is a trade secret.

300

These attacks use deception to acquire sensitive personal information by masquerading as official looking emails or instant messages.

What are Phishing attacks.

300

What is a low cost, scaled down version of a data warehouse.

What is a Data Mart.

300

What type of knowledge deals with more objective, rational, and technical knowledge

What is explicit knowledge

300

This is a high speed central network to which multiple smaller networks connect

What is a back bone network

400

Software that collects personal information about users without their consent.

What is Spyware.

400

This segment of computer code performs malicious actions and will replicate by itself without need of another computer program.

What is a worm.

400

What is a common representation for a multi dimensional structure.

What is a Data Cube

400

What does the abbreviation KMS stand for

What is knowledge management systems

400

What is the most prevalent form of communication wiring and is used for almost all business telephone wiring

What is a twisted pair wire

500

This encryption security flaw was found by Googles security team in 2014 that exposed the OpenSSl software

What is the heartbleed bug.

500

This computer code is embedded within an organizations existing computer programs and is designed to activate and perform a destructive action at a certain time or date. 

What is a logic bomb.

500

What are subjects such as product, geographic area, and time period that represent the edges of a data cube.

What are business dimensions.

500

What is the cumulative store of subjective or experimental learning

What is tacit knowledge

500

This consists of thousands of very thin filaments of glass that transmit information via light pulses by lasers.

What is fiber optic cable

M
e
n
u