Chapter 6
Chapter 6
Chapter 6
Chapter 6
Chapter 6
200

Controls that restrict unauthorized individuals.

What are Access Controls?
200

Clandestine software that is installed on your

computer

What is Alien Software?


200

The Science and technology of authorization

What are Bio Metrics?

200

An examination of information systems

What is an Audit?

200

A process that determines the identity of the

person requiring access.

What is Authentication?


300

Typically a password, known only to the attacker,

that allows the attacker to access the system

What is backdoor?

300

A computer that has been compromised by, and under the control of, a hacker.

What is a Bot?

300

Each characteristic or quality of a particular entity

What is an Attribute?

300

The most effective and efficient ways to do things.

What are Best Practices?

300

A binary digit—that is, a 0 or a 1.

What are Bits?

400

A group of eight bits that represents a single character.

What are Bytes?

400

A collection of logically related records.

What are Data Files?

400

A grouping of logically related records

What is a Table?

400

Each row in a relational table, which is a specific,

unique representation of the entity.

What is an instance?

400

A characteristic of interest that describes an entity.

What is a Field?

500

Operators that illustrate an association between

two entities.

What are relationships?

500

The transmission capacity of a network, stated in

bits per second.

What is Bandwidth?

500

The transmission capacity of a communications

medium faster than 4 Mbps.

What is Broadband?

500

The use of the Internet as the transmission medium

for telephone calls.

What is VOIP?

500

Computers that provide access to various network services, such as printing, data, and communications.

What are Servers?