Risk
Software Attacks
Data
Internet Connection Methods
Communication
100
A process that identifies, controls, minimizes the impact of threats, in a effort to reduce risk to manageable levels.
What is risk management
100
Segment of computer code that performs malicious actions by attaching to another computer program.
What is Virus
100
A collection of logically related records.
What is a data file
100
Still used in the United States where broadband is not available
What is Dial-up
100
The largest -volume application running over the Internet.
What is Electronic Email
200
The likelihood that a threat will occur.
What is risk
200
Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program).
What is a Worm
200
A group of logically related files that stores data and the associates among them.
What is a database
200
Broadband access via telephone companies
What is DSL
200
An arrangement whereby participants exchange conversational messages in real time.
What is Electronic Chat Rooms
300
A process in which the organization transfers the risk by using other means to compensate for a loss, such as by purchasing insurance.
What is risk transference
300
Uses deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.
What is Phishing Attack
300
An approach to managing information across an entire organization.
What is data governance
300
Expensive and usually only placed in new housing developments.
What is Fiber-to-the-home (FTTH)
300
Online customer support is handled through
What are Web-Based Call Centers
400
The process by which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it.
What is risk analysis
400
Software programs that hide other computer programs and reveal their designed behavior only when they are activated.
What is a Trojan Horse
400
Collection of definitions of data elements.
What is a data dicitonary
400
very convenient,and WiMAX will increase the is of broadband wireless
What is Wireless
400
The use of the Internet as the transmission medium for telephone calls
What is Internet Telephony
500
A process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.
What is risk mitigation
500
A segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform and destructive action at a certain tie or date.
What is a Logic Bomb
500
The software program or group of programs that provides access to a database.
What is database management system (DBMS)
500
Access where cable and DSL are not available.
What is Satallite
500
Common hardware and software platform that simplifies and integrates all forms of communications-voice, email, instant messaging, location, and videoconferencing- across and organization.
What is Unified Communications