Security Threats
Security Tools and laws
ICT Industry
System development
Information Systems
100

This is any software designed to harm, disrupt, or gain unauthorized access to a computer system.

What is malware?

100

This program detects, quarantines, and removes malware from your computer.

What is an antivirus program?

100

This law states that the number of transistors on a chip doubles roughly every 18 to 24 months, meaning computing speed doubles at the same rate

What is Moore's Law?

100

These are the five stages of building a system in order: planning, analysis, design, implementation, and maintenance.

What is SDLC?

100

This system processes business transactions at the operational level such as sales, payments, and orders.

What is a TPS?

200

This malware disguises itself as a legitimate program but carries a malicious payload underneath.

What is a Trojan?

200

This security tool monitors and controls incoming and outgoing network traffic to block unauthorized access from outside.

What is a firewall?

200

This is hiring another company to do part of your work to save money on labor, taxes, or components.

What is outsourcing?

200

This development approach puts developers, analysts, and users in the same room to fix problems as they go instead of waiting until the end.

What is JAD?

200

This system uses fuzzy logic to simulate the gut-feeling decision making process of a human expert

What is an Expert System?

300

This type of malware locks your files and demands payment to restore access.

What is ransomware? 

300

This antivirus technique looks for suspicious behavior in programs rather than relying on known virus signatures.

What is heuristic analysis?

300

This is the analog portion of the phone network that runs from the telephone company directly to the customer and is not yet digitized.

What is the Last Mile?

300

This is the most common cause of project failure and involves adding new features or requirements after the project has already started.

What is feature creep?

300

This stands for Performance, Information, Economics, Control, Efficiency, and Service and describes the categories of problems a business could face in an information system.

What is PIECES?

400

This malware hides deep in a computer's operating system, gives attackers permanent unauthorized access, and conceals its own presence.

What is a rootkit virus?

400

This federal law protects the privacy of electronic communications and sets the rules for when the government can legally access them. 

What is the Electronic Communications Privacy Act?

400

This refers to a new product or service that completely displaces an existing industry, often wiping out companies that did everything right

What is disruptive technology?

400

These are the four types of testing in order from first to last: testing your own work, testing against teammates, testing against other systems, and having users try to break it.

What is unit, integration, system, and acceptance testing?

400

This is the total number of information received not counting overhead, errors, or dropped packets.

What is throughput?

500

This is a network of infected computers controlled by a criminal and used to carry out large scale attacks like DDoS.

What is a botnet?

500

This law expanded government surveillance powers after September 11, 2001 and allowed broader monitoring of electronic communications.

What is the Patriot Act?

500

This is the act of reporting illegal or unethical behavior within an organization you are associated with, and is protected by law in certain circumstances.

What is whistleblowing?

500

This tool helps developers build systems by documenting requirements, diagramming systems, developing programs, and automatically flowing changes through all related code.

What is a CASE tool?

500

This is a specialized facility designed to hold and protect computer systems and data both physically and electronically. A version of it operates with no people and keeps the lights permanently off.

What is a data center?