Chapter 4 Terms
Chapter 4 Terms (Continued)
Chapter 5 Terms
Chapter 5 Terms (Continued)
Chapter 6 Terms
100

Segment of computer code that performs malicious actions by attaching to another computer program.

What is a Virus?

100

Typically a password, known only to the attacker, that allows him or her to access a computer system at will, without having to go through any security procedures.

What is a Back Door?

100

A collection of data so large and complex that it is difficult to manage using traditional database management systems.

What is Big Data?

100

Information Technologies used to systemize, enhance and expedite intra- and interfirm knowledge management.

What are Knowledge Management systems?

100

The transmission capacity of a network, stated in bits per second. 

What is Bandwidth?

200

Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program.

What is a Worm?

200

A segment of computer code that is embedded within an organization’s existing computer programs and is designed to activate and perform a destructive action at a certain time or date.

What is a Logic Bomb?

200

Precise descriptions of policies, procedures, or principles in any organization that stores and uses data to generate information. 

What is Business Rules?

200

A field (or attribute) of a record that uniquely identifies that record so that it can be retrieved, updated and sorted.

What is the Primary Key?

200

The transmission capacity of a communications medium faster than 4 mbps.

What is Broadband?

300

Phishing attacks use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.

What is a Phishing Attack?

300

An attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes.

What is a Denial Of Service Attack?

300

Other terms for knowledge

What is Intellectual Capital?

300

A method for analyzing and reducing a relational database to it's most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.

What is Normalization?

300

Software applications through which users primarily access the web.

What is a Browser?

400

The perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information.

What is Spear phishing?

400

An attacker first takes over many computers, typically by using malicious software. These computers are called zombies or bots. The attacker uses these bots—which form a botnet—to deliver a coordinated stream of information requests to a target computer, causing it to crash.

What is a Distributed Denial Of Service Attack?
400

A process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "Single version of the truth" for the company's core master data. 

What is Master Data Management?

400

A field that has some identifying information but typically does not uniquely identify a record with complete accuracy.

What is the Secondary Key?

400

Insulated copper wire; used to carry high speed data traffic and television signals. 

What are Coaxial Cables?

500

Software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

What is a Trojan Horse?

500

Storage of data in more than two dimensions.

What is Multidimensional Structure?

500

The cumulative store of subjective or experiential learning, which is highly personal and hard to formalize.

What is tacit knowledge?

500

An organization's network composed of interconnected multiple LANs an WANs.

What is an enterprise network?