Controls that restrict unauthorized individuals.
Clandestine software that is installed on your
computer
What is Alien Software?
The Science and technology of authorization
What are Bio Metrics?
An examination of information systems
What is an Audit?
A process that determines the identity of the
person requiring access.
What is Authentication?
Typically a password, known only to the attacker,
that allows the attacker to access the system
What is backdoor?
A computer that has been compromised by, and under the control of, a hacker.
What is a Bot?
Each characteristic or quality of a particular entity
What is an Attribute?
The most effective and efficient ways to do things.
What are Best Practices?
A binary digit—that is, a 0 or a 1.
What are Bits?
A group of eight bits that represents a single character.
What are Bytes?
A collection of logically related records.
What are Data Files?
A grouping of logically related records
What is a Table?
Each row in a relational table, which is a specific,
unique representation of the entity.
What is an instance?
A characteristic of interest that describes an entity.
What is a Field?
Operators that illustrate an association between
two entities.
What are relationships?
The transmission capacity of a network, stated in
bits per second.
What is Bandwidth?
The transmission capacity of a communications
medium faster than 4 Mbps.
What is Broadband?
The use of the Internet as the transmission medium
for telephone calls.
What is VOIP?
Computers that provide access to various network services, such as printing, data, and communications.
What are Servers?