It refers to illegal activities conducted over computer networks, particularly the internet.
What is Cybercrime.
This hacking organization breeched Sony's network in 2015.
Who are the Guardians of Peace.
What is so large and complex that it is difficult to manage using traditional management systems.
What is Big Data.
This is a process that helps organizations manipulate important knowledge that comprises part of the organizations memory.
What is knowledge management.
This is a network that covers a large geographical area
What is a wide area network
This occurs when an unauthorized individual attempts to gain illegal access to organizational information.
What is espionage.
This is a software program that hides in other computer programs and reveals its designed behavior only when activated.
What is a Trojan Horse.
What is a repository of historical data that are organized by subject to support decision makers in the organization.
What is a Data Warehouse.
What is another way to describe knowledge in a business IT department
What is intellectual capital or intellectual assets.
This is a communication processor that routes messages from a LAN to the internet
What is a router
This is intellectual work that is a company secret and is not based on public information.
What is a trade secret.
These attacks use deception to acquire sensitive personal information by masquerading as official looking emails or instant messages.
What are Phishing attacks.
What is a low cost, scaled down version of a data warehouse.
What is a Data Mart.
What type of knowledge deals with more objective, rational, and technical knowledge
What is explicit knowledge
This is a high speed central network to which multiple smaller networks connect
What is a back bone network
Software that collects personal information about users without their consent.
What is Spyware.
This segment of computer code performs malicious actions and will replicate by itself without need of another computer program.
What is a worm.
What is a common representation for a multi dimensional structure.
What is a Data Cube
What does the abbreviation KMS stand for
What is knowledge management systems
What is the most prevalent form of communication wiring and is used for almost all business telephone wiring
What is a twisted pair wire
This encryption security flaw was found by Googles security team in 2014 that exposed the OpenSSl software
What is the heartbleed bug.
This computer code is embedded within an organizations existing computer programs and is designed to activate and perform a destructive action at a certain time or date.
What is a logic bomb.
What are subjects such as product, geographic area, and time period that represent the edges of a data cube.
What are business dimensions.
What is the cumulative store of subjective or experimental learning
What is tacit knowledge
This consists of thousands of very thin filaments of glass that transmit information via light pulses by lasers.
What is fiber optic cable