Attacks
Risk
Data
Data Management
Network
100
Segment of computer code that performs malicious actions by attaching to another computer program.
What is virus
100
The likelihood that a threat will occur.
What is risk
100
Data collected about user behavior and browsing patterns by monitoring users’ activities when they visit a Web site.
What is clickstream data
100
A process that helps orga- nizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organiza- tion’s memory and that typically reside within the organization in an unstructured manner.
What is knowledge management
100
A network that connects commu- nications devices in a limited geographical region, such as a building, so that every user device on the network can com- municate with every other device.
What is local area network
200
Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program.
What is worm
200
A strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur.
What is risk acceptance
200
A collection of logically related records.
What is data file
200
Information tech- nologies used to systematize, enhance, and expedite intra- and interfirm knowledge management.
What is knowledge management systems
200
Computers that act as exchange points for Internet traffic and determine how traffic is routed.
What is network access points
300
Phishing attacks use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.
What is phishing attack.
300
The process by which an organization assesses the value of each asset being protected, estimates the prob- ability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.
What is risk analysis
300
An approach to managing information across an entire organization.
What is data governance
300
A process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely “single version of the truth” for the company’s core master data.
What is master data management
300
The set of rules and procedures governing transmis- sion across a network.
What is protocol
400
Phishing attacks target large groups of people. In spear phishing attacks, the perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will be able to obtain sensitive, personal information.
What is spear phishing attack.
400
A strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat.
What is risk limitation
400
Diverse, high-volume, high-velocity information assets that require new forms of processing to enable enhanced decision making, insight discovery, and process optimization.
What is Big Data
400
Data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data.
What is relational database model
400
A file transfer protocol that can send large files of infor- mation across sometimes unreliable networks with assurance that the data will arrive uncorrupted.
What is TCP/IP
500
Attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes (ceases to function).
What is denial of service attack.
500
A process that identifies, controls, and minimizes the impact of threats, in an effort to reduce risk to manageable levels.
What is risk management
500
Collection of definitions of data elements; data characteristics that use the data elements; and the indi- viduals, business functions, applications, and reports that use this data element.
What is data dictionary
500
Storage of data in more than two dimensions; a common representation is the data cube.
What is multidimensional structure.
500
The use of digital technologies that enable organizations or individuals to collaboratively plan, design, develop, manage, and research products, services, and innovative information systems and electronic commerce applications.
What is virtual collaboration
M
e
n
u