Chapter 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Coaxial Cable

A cable that consists of a single copper wire that is surrounded by insulation and a wire mesh shield

Twisted-pair Cable

A cable that consists of four pairs of wires that are twisted around each other. Each copper wire is insulated in plastic, and all wires are collectively bound together in a layer of plastic

Data Warehouse

A central repository where records from multiple databases are stored

Router

A complex device that stores the routing information for networks. It looks at each packet's header to determine where the packet should go, then determines the best route for the packet to take toward its destination.

NIC

A computer component that translates and transmits network packets

Cyberterrorism

A dangerous form of hacking that seeks to create large-scale chaos and damage to a country's infrastructure

LAN

A data communication system consisting of multiple devices that are relatively near each other and are connected using cables or wireless media

Bridge

A device that connects two LANs or two segments of the same LAN; looks at the information in each packed header and forwards data traveling from one LAN to another

Social Engineering

A form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

Malware

A generic term to describe various kinds of malicious programs created to harm a computer or steal valuable information

Data Validation

A method for checking and improving the reliability of data

Distributed Denial-of-Server (DDoS)

A network attack that attempts to shut down or block access to websites or other network resources by overwhelming them with requests

Repeater

A network device used to prevent attenuation when packets are traveling long distances

Trojan Horse

A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system

Authentication

A security measure used to confirm an individual's identity

Authorization

A security measure used to give individuals a certain level of access based on who they are

Extranet

A service that allows organizations to share some of its intranet resources with people outside the organization

MIS

A set of software tools that enables managers to gather, organize, and evaluate information

Decision Support System (DSS)

A special application that collects and reports certain types of data, thus helping managers make better decisions

RAID

A storage system that links any number of disk drives (a disk array) so that they act as a single disk

VPN

A type of connection that increases the security of network communication by employing a method called "tunneling" whereby each packet from the sending computer is encapsulated within another packet

TPS

A type of information system that handles the processing and tracking of transactions.

Expert System

A type of information system that performs analytical tasks traditionally done by a human, using sequences of questions to ask and actions to take based on the responses to those questions

Virus

A type of malware that is attached to a host file and has the ability to replicate or copy, itself

Worm

A type of malware that self-replicates and spreads through computers and networks without the need to attach to a host file

Scareware

A type of scam whose goal is to scare the user into doing exactly what the thief wants.

Zombie

An infected and compromised computer that is under the external control of a hacker, usually without the knowledge of the computer's owner.

Countermeasure

Any step you take to ward off a threat

Pretexting

Gaining someone's trust by pretending you are someone else

Bandwidth

In networks, it refers to the amount of data that can be transmitted over a given amount of time

Phishing

Luring individuals into entering personal information into a website controlled by a hacker

Botnet

Massive networks of zombies that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks

Fault-tolerant

Systems that are able to continue their operation even when problems are present

Mission Critical

Systems that must run without failure or with nearly instant recover from failure

Interoperability

The ability of each organization's information system to work with the other, sharing data and services

Scalability

The capacity to provide increasing amounts of computing power, storage, and/or software

Data Mining

The discovery of new patterns or relationships between data

Attenuation

The loss of intensity and clarity of a transmitted data signal

Ethernet

The most common physical standard for local area networks

Cybercrime

The use of a computer and/or network to commit a variety of crimes, such as creating viruses or disrupting networks


Ensembles d'études connexes

Chapter 6: The circulatory system

View Set

SOCI305 Marriage and the Family Test 2

View Set

Week 13-14 - Non-pathologic factors, Calibration, Norm data, Case report, ECochG

View Set