Deliberate threats to informations systems.
security
the kms cycle
database approach
100
when an unauthorized individual attempts to gain illegalaccess to organizational informations.
What is espionage or trespass
100
preventing someone from accessing a building such as walls, doors, fencing,gates
What is physical controls
100
knowledge is created as people determan new ways of doing things.
What is create knowlege
100
the same data stored in multiple locations
What is data redundancy
200
when an attacker either threatens to steal or actually stealsinformation from a company
What is information extortion
200
restricts someone from using information resources
What is access controls
200
new knowledge must be identified as valuable and be represented in a reasonable way
What is capture knowledge
200
applications cannot access data associated with other applications
What is data isolation
300
deliberate acts that inolve defacing an organizations web site
What is sabotage or vandalizm
300
conefirms the identity of the person requiring access
What is authentication
300
new knowledge must be placed in context so that it is actionable
What is refine knowledge
300
datvarious copies of the data do not agree
What is data inconsistency
400
is the deliberate assumption of another persons identity.
What is identity theft
400
determines which actions rights or privileges the person has based of his or her verified identy
What is authorization
400
useful knowledge must then be stored in a reasonable format in a knowledge repository
What is store knowledge
400
applications and data are independent of one another
What is data independence
500
when some one uses a worm or virus to attack infect your computer
What is software attacks
500
when using a fingerprint instead of a passcode
What is biometric scanner
500
like a librart the knowledge mus be kept current
What is manage knowledge
500
a method for analyzing and reducing a relational database.
What is normalization