Computer Crime
Managing IS Security
IS Hardware
Networking
Potpourri
100
Anyone who can gain unauthorized access to computers
What is a hacker?
100
How a business continues operating after a disaster?
What is a business continuity plan?
100
Keyboards, pointing devices, scanners and touch screens are examples of this.
What are input devices?
100
Spans a relatively short distance such as within a single building, connecting the computers within its area together.
What is a local area network (LAN)?
100
Identification via fingerprints, retinal patterns in the eye, facial features, or other bodily characteristics
What is biometrics?
200
Individuals who break into computer systems with the intent to commit crime or do damage
Who are black hat hackers?
200
Detailed procedures for recovering from systems-related disasters
What is a disaster recovery plan?
200
The computer’s brain.
What is the CPU?
200
Used to connect multiple computers, servers, or printers to create a network.
What is a switch?
200
Part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network.
What is a firewall?
300
This type attack seeks to overload servers, typically using a network of hacked computers that are controlled remotely, by sending too many requests or messages to the server for it to handle.
What is a denial of service attack?
300
An empty warehouse with all necessary connections for power and communication but nothing else
What is a cold backup site?
300
Permanent storage, such as a hard drive, used to store software and data both when the computer is in use and between uses.
What is secondary storage?
300
Used for both cell phones and wireless networks, albeit at different frequencies.
What is high-frequency radio?
300
Each table contains only attributes related to the entity and helps to eliminate data duplication.
What is normalization?
400
Software that monitors the activity on a computer, such as the Web sites visible or even the keystrokes of the user
What is spyware?
400
Fully equipped backup facility, all needed equipment and one-to-one replication of current data
What is a hot backup site?
400
Used to connect to networks and other external devices.
What are ports?
400
LAN protocol developed by Xerox in 1976, allows multiple types of data (including IP datagrams) to flow over the LAN
What is Ethernet?
400
The most common type of business database .
What are relational databases?
500
A small file Web sites place on a user’s computer; can be legitimate (to capture items in a shopping cart) but can be abused (to track individuals’ browsing habits) and can contain sensitive information (like credit card numbers) and pose a security risk
What is a cookie?
500
The maximum time allowed to recover from a catastrophic event
What is the recovery time objective?
500
Printers and monitors are examples of these?
What are output devices?
500
Common ones include: copper twisted pair, copper-based coaxial cable, and fiber-optic.
What are types of media cable?
500
The practice of buying Internet domain names that might be of significant value to another company or person, then holding them for sale.
What is cybersquatting?
M
e
n
u