Security
Data
Software
Networking
Applications
100
The right to be left alone and to be free of unreasonable personal intrusion.
What is privacy?
100
Diverse, high-volume, high-velocity information assets that require new forms of processing to enable enhanced decision making, insight discovery, and process optimization.
What is Big Data?
100
Malicious software that can attach itself to (or "infect") other computer programs without the owner of the program being aware of the infection.
What is a virus?
100
A massive global WAN that connects approximately 1 million organizational computer networks in more than 200 countries on all continents, including Antarctica, and features in the daily routine of almost 2 billion people.
What is the Internet?
100
A computer program that searches for specific information by key words and reports the results.
What is a search engine?
200
The likelihood that a threat will occur.
What is risk?
200
A collection of logically related records.
What is a data file?
200
The software program (or group of programs) that provides access to a database.
What is a database management system (DBMS)?
200
A set of rules responsible for disassembling, delivering, and reassembling packets over the internet.
What is Internet Protocol (IP)?
200
Clandestine software that is installed on your computer through duplicitous methods.
What is alien software?
300
Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
What are physical controls?
300
A low-cost, scaled-down version of a data warehouse that is designed for the end-user needs in a strategic business unit (SBU) or a department.
What is a data mart?
300
A software program containing a hidden function that presents a security risk.
What is a Trojan horse?
300
A company that provides Internet connections for a fee.
What is an Internet service provider (ISP)?
300
A computer program that searched several search engines at once and integrates the findings of the various search engines to answer queries posted by users.
What is a metasearch engine?
400
The degree of protection against criminal activity, danger, damage, and/or loss.
What is security?
400
A group of logically related files that stores data and the associations among them.
What is a database?
400
A process that encrypts each data packet to be sent and places each encrypted packet inside another packet.
What is tunneling?
400
The primary connection network connections and telecommunications lines that link the computers and organizational nodes of the Internet.
What is the Internet backbone?
400
Software applications through which users primarily access the web.
What are browsers?
500
A third party that acts as a trusted intermediary between computers (and companies) by using digital certificates and verifying the worth and integrity of the certificates.
What is certificate authority?
500
Data collected about user behavior and browsing patterns by monitoring users' activities when they visit a website.
What is clickstream data?
500
Destructive programs that replicate themselves without requiring another program to provide a safe environment ot replicate.
What are worms?
500
A private network that uses Internet software and TCP/IP protocols.
What is an Intranet?
500
Firefox
What is a browser?