title of chapter 4
information security
title to chapter 5
data and knowledge managment
what are we learning?
telecommunications and networking
the 2 access controls
authentication and authorization
one of the seven data hierarchy
byte
types of network processing
client/server computing and peer to peer processing(P2P)
name one of the 3 software attacks
logic bomb
the three characteristics of big data?
volume, velocity, variety
the two basic concepts
digital signals and modem or modulator-demodulator
which two areas pose significant threats?
human resources and information systems
what does database management systems maximize?
data security, data integrity, data independence
the three communications media and channels?
twisted-pair wire, coaxial cable, and fiber
name the 4 types of alien software
adware, spyware, spamware, and cookies
issues with big data
big data changes, especially in data streams
four layers of the TCP/IP reference model
application layer, transport layer, internet layer, and network interface layer