the 90's
What kind of Mainframe did the County first install and use?
Unisys A Series
A process where a user is required to confirm their identity by providing more than one type of verification
Multi-Factor Authentication MFA
The County Supervisor for District 2
Michelle Bushnell
A way for two or more computer programs to communicate with each other
Application Programming Interface (API)
The process of protecting desktops, laptops and mobile devices from being exploited
Endpoint Security
What programing language was used on the County Mainframe
COBOL
Digital technology that allows users to instantly generate and share information with the public
Social Media
Dept. of Justice filed a _________ on 9/7/16 against the County for failure to meet the Americans with Disability Act
Consent Decree
A dedicated, high-speed network device that provides access to block-level storage
Storage Area Network (SAN)
A type of malware that encrypts the victim's hard drive and denies them access to key files.
RANSOMEWARE
Name 3 Departments or Applications that ran on the County Mainframe
WELFARE -Welfare Dept. now DHHS
BFS -Child Support
CRIMES -District Attorney
CUBS -???
RMS -Sheriff's
TAX -Treasurer
A two dimensional bar code that is used to provide easy access to online information through the digital camera on a smartphone or tablet.
Quick Response "QR" Code
1968 California Gov't Code requires disclosure of government records to the public upon request, unless exempted by law
Public Records Act
SQL code that you can save, so the code can be reused over and over again
Stored Procedure
Device or software application that filters traffic between a device and a network
Firewall
How much disk space did the Mainframe have:
5GBs
100GBs
1TB
5TB
5GBs
Media content that is delivered to computers and mobile devices via the internet and played back in real time
Streaming
The department that stimulates business attraction and retention, employment opportunities and growth for the County
Economic Development
Software that separates a computer's operating system and applications from the underlying physical hardware:
Hypervisor
A monitoring system that that detects suspicious activities on the perimeter of the network and generates alerts when they are detected
Intrusion Detection System (IDS)
What were the Terminals used to communicate with the Mainframe
T-27's
A cloud computing service operated by Microsoft for application management via Microsoft-managed data centers
Azure
A group of citizens—empowered by law to conduct legal proceedings, investigate potential criminal conduct, and determine whether criminal charges should be brought
Grand Jury
A location that stores temporary data within a program which can be modified, stored and displayed
Variable
Collects event log data from various sources, detects, analyzes, alerts and responds to security threats
Security information and Event Management (SIEM)