Threats to IS
Types of Software Attacks
Database Management Systems
KMS Cycle
Chapter 6 Vocabulary
100
Information Extortion
What is it when an attacker either threatens to steal or actually steals information from a company?
100
Virus
What is the segment of computer code that performs malicious actions by attaching to another computer program?
100
Data Redundancy
What is the same data stored in multiple locations?
100
Create Knowledge
What is knowledge created as people find new ways of doing things?
100
Backbone Networks
What are high-speed central networks to which multiple smaller networks (e.g., LANs and smaller WANs) connect?
200
Identity Theft
What is the deliberate assumption of another person's identity, usually to gain access to their financial information?
200
Worm
What is the segment of code that performs malicious actions and will spread by itself?
200
Data Inconsistency
What is when various copies of the data do not agree?
200
Disseminate Knowledge
What is knowledge that must be made available in a useful format to anyone, anywhere and anytime?
200
Chat Room
What is a virtual meeting place where groups of regulars come to “gab” electronically?
300
Espionage
What is an unauthorized individual who attempts to gain access to organizational information?
300
Phishing
What is using deception to acquire sensitive personal information by hiding as official looking messages?
300
Data Independence
What is when applications and data are independent of one another?
300
Capture Knowledge
What is new knowledge identified as valuable and be represented in a reasonable way?
300
Digital Signals
What is a discrete pulse, either on or off, that conveys information in a binary form?
400
Sabotage
What is deliberate acts that involve defacing and organizations web site?
400
Trojan Horse
What is software programs that hide in other programs and reveal their designed behavior when activated?
400
Data Isolation
What is when applications cannot access data associated with other applications?
400
Manage Knowledge
What is information that like a library, must be kept current?
400
Twisted-pair Wire
What is a communications medium consisting of strands of copper wire twisted together in pairs?
500
Theft of Equipment
What is the illegal acquisition of computers, laptops, smart phones and other smaller devices.
500
Back Door
What is a password known only by the attacker, which allows them to access a computer system at will?
500
Data Integrity
What is when data meets certain constraints?
500
Refine Knowledge
What is new knowledge that must be placed in context so it becomes reasonable?
500
Peer-to-Peer(P2P) Processing
What is a type of client/server distributed processing that allows two or more computers to pool their resources, making each computer both a client and a server?