information security
Information security part 2
Data and Knowledge
Managemnt
Data and Knowledge
Managemnt
Data and Knowledge
Managemnt
100
Protecting an organization information and information systems from unauthorized access, use.
What is information Security?
100
A computer that has been compromised by and under control of a hacker.
What is bot
100
A group of logically related files that stores data and the associations among them
What is database
100
The transmission capacity of a network, stated in bits per second
What is Bandwidth
100
A network that connects communication devices in a limited geographic region, such as a building, so that every user device on the network can communicate with every other device
What is Local Area Network (LAN)
200
Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud.
What is identity theft?
200
The process of converting an original message into a form that cannot be read by anyone expect the intended receiver
What is encryption
200
A grouping of logically related records.
What is file
200
The transmission capacity of a communications medium faster than 4 Mbps downstream and 1 Mbps upstream
What is Broadband
200
The transmission technology that divides blocks if text into packets
What is Packet Switching
300
a secret word or expression used by authorized persons to prove their right to access, information, etc.
What is password
300
A fully configured computer facility, with all information resources and services, communications links, and physical plant operations, that duplicates your company's computing resources and provides near real time recovery of IT operations
What is Hot Sites
300
A grouping of logically related fields.
What is record
300
Software applications through which users primarily access the web
What is Browsers
300
Collectively, all of the web pages of a particular company or individual
What is web site
400
an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
What is Firewall.
400
The harm, loss, or damage that can result if a threat compromises an information resource
What is Exposure
400
An identifier field or attribute that has some identifying information, but typically does not identify the file with complete accuracy.
What is secondary key
400
A discrete pulse, either on or off, that conveys information in a binary form
What is Digital Signals
400
Two or more individuals who act together to perform some task, on either a permanent or temporary basis
What is Work Group
500
software intended to damage a computer, mobile device, computer system, or computer network, or to take partial control over its operation
What is Malware
500
Copying a software program(other than freeware, demo software, etc.) without making payment to the owner
What is Piracy
500
The identifier field or attribute that uniquely identities a record. 
What is primary key
500
A private network that uses internet software and TCP/IP protocols
What is Intranet
500
A system of universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture; it uses the transport functions of the Internet
What is World Wide Web (The Web, WWW, or W3)