Can be defined as the degree of protection against criminal activity, danger, damage, and/or loss.
What is Security?
Segment of computer code that performs malicious actions by attaching to another computer program.
What is a virus?
The same data are stored in multiple locations.
What is Data redundancy?
In computer data storage, a "blank" or logical drive is a single accessible storage area with a single file system, typically (though not necessarily) resident on a single partition of a hard disk.
Still used in the United States where broadband is not available
What is Dial-up?
Following this broad definition, "blank" refers to all of the processes and policies designed to protect an organization’s information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction.
What is Information Security?
Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program).
What is a worm?
Applications cannot access data associated with other applications.
What is Data isolation?
The rate at which data flow into an organization is rapidly increasing.
What is Velocity?
Broadband access via telephone companies
What is DSL?
A "blank" to an information resource is any danger to which a system may be exposed.
What is a threat?
Phishing attacks target large groups of people. In "blank" phishing attacks, the perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information.
What is spear phishing?
Various copies of the data do not agree.
What is Data inconsistency?
Traditional data formats tend to be structured and relatively well described, and they change slowly. Traditional data include financial market data, point-of-sale transactions, and much more.
What is Variety?
Access over your cable TV coaxial cable. Can have degraded performance if many of your neighbors are accessing the Internet at once
What is Cable modem?
Refers to illegal activities conducted over computer networks, particularly the Internet. iDefense (http://labs.idefense.com), a company that specializes in providing security information to governments and Fortune 500 companies, maintains that groups of well-organized criminal organiza tions have taken control of a global billion-dollar crime network.
What is Cybercrime?
Software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
What is a Trojan horse?
Data meet certain constraints; for example, there are no alphabetic characters in a Social Security number field.
What is Data integrity?
refers to inaccurate, incomplete, incorrect, duplicate, or erroneous data.
What is Dirty data?
Access where cable and DSL are not available
What is Satellite?
Is the possibility that the system will be harmed by a threat.
What is vulnerability?
A segment of computer code that is embedded within an organization’s existing computer programs and is designed to activate and perform a destructive action at a certain time or date.
What is a Logic bomb?
Applications and data are independent of one another; that is, applications and data are not linked to each other, so all applications are able to access the same data.
What is Data independence?
is accessible public data that individuals and organizations can use to create new businesses and solve complex problems. In particular, government agencies gather very large amounts of data, some of which is Big Data.
What is Open data?
Expensive and usually placed only in new housing developments