Segment of computer code that performs malicious actions by attaching to another computer program.
What is a Virus?
Typically a password, known only to the attacker, that allows him or her to access a computer system at will, without having to go through any security procedures.
What is a Back Door?
A collection of data so large and complex that it is difficult to manage using traditional database management systems.
What is Big Data?
Information Technologies used to systemize, enhance and expedite intra- and interfirm knowledge management.
What are Knowledge Management systems?
The transmission capacity of a network, stated in bits per second.
What is Bandwidth?
Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program.
What is a Worm?
A segment of computer code that is embedded within an organization’s existing computer programs and is designed to activate and perform a destructive action at a certain time or date.
What is a Logic Bomb?
Precise descriptions of policies, procedures, or principles in any organization that stores and uses data to generate information.
What is Business Rules?
A field (or attribute) of a record that uniquely identifies that record so that it can be retrieved, updated and sorted.
What is the Primary Key?
The transmission capacity of a communications medium faster than 4 mbps.
What is Broadband?
Phishing attacks use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.
What is a Phishing Attack?
An attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes.
What is a Denial Of Service Attack?
Other terms for knowledge
What is Intellectual Capital?
A method for analyzing and reducing a relational database to it's most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.
What is Normalization?
Software applications through which users primarily access the web.
What is a Browser?
The perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information.
What is Spear phishing?
An attacker first takes over many computers, typically by using malicious software. These computers are called zombies or bots. The attacker uses these bots—which form a botnet—to deliver a coordinated stream of information requests to a target computer, causing it to crash.
A process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "Single version of the truth" for the company's core master data.
What is Master Data Management?
A field that has some identifying information but typically does not uniquely identify a record with complete accuracy.
What is the Secondary Key?
Insulated copper wire; used to carry high speed data traffic and television signals.
What are Coaxial Cables?
Software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
What is a Trojan Horse?
Storage of data in more than two dimensions.
What is Multidimensional Structure?
The cumulative store of subjective or experiential learning, which is highly personal and hard to formalize.
What is tacit knowledge?
An organization's network composed of interconnected multiple LANs an WANs.
What is an enterprise network?