Protecting an organization’s information and information systems from unauthorized access, use,disclosure, disruption, modification, or destruction.
Information security
A set of core data, such as customer, product,employee, vendor, geographic location, and so on, that span an enterprise’s information systems.
Master Data
A binary digit that is, a 0 or a 1.
Bit
The transmission capacity of a network, stated in bits per second.
bandwidth
a handheld hardware input device that controls a cursor in a GUI
Computer Mouse
Malicious software such as viruses and worms.
Malware
A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.
Normalization
A group of eight bits that represents a single character.
Byte
The transmission capacity of a communications medium faster than 4 Mbps
Broadband
the brains of the computer where most calculations take place
Central Processing Unit (CPU)
A private combination of characters that only the user should know.
Password
A grouping of logically related records.
Table
Describes the classification of a relationship:one-to-one, one-to-many, or many-to-many.
Connectivity
Computers, such as users’ personal computers, thatuse any of the services provided by servers.
Clients
a type of connector commonly used for Ethernet networking
RJ45 Cable
An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail.
Phishing Attack
A process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization’s memory and that typically reside within the organization in an unstructured manner.
Knowledge Management
Precise descriptions of policies, procedures, or principles in any organization that stores and uses data to generate information.
business rules
Insulated copper wire; used to carry high-speed data traffic and television signals
coaxial cable
a device that incorporates either a fan or some other means to keep a hot component, such as a processor, cooled down
Heat Sink
A separate organizational localarea network that is located between an organization’s internalnetwork and an external network, usually the Internet.
Demilitarized Zone (DMZ)
A database operation that combines records from two or more tables in a database
Join Operation
A relationship that exists when two entities are associated.
binary relationship
The system administered by the Internet Corporation for Assigned Names (ICANN) that assigns names to each site on the Internet.
domain name system (DNS)
a hardware component, typically a circuit board or chip, which is installed on a computer so that it can connect to a network
Network Interface Card