MIS142 Chapter 5
Fault-tolerant
systems that are able to continue their operation even when problems are present
Interoperability
the ability to exchange and use computer information within and across networks
Wireless network
use radio or infrared signals that travel through the air to transmit data
Social Engineering
A form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
Business intelligence (BI)
A framework that encompasses all of the data, tools, and strategies used by businesses to improve decision making and make predictions.
An _____ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in a knowledge base
Expert
Systems known as ______ are able to continue their operation, even when problems are present
Fault-tolerant
Many thieves use the temptation of free (illegal) software on _______ services to lure individuals into downloading malware
File-sharing
Bandwidth
In networks, it refers to the amount of data that can be transmitted over a given amount of time.
Hacker
In the negative sense, this term refers to an individual who uses a computer and/or network to commit a variety of crimes, such as creating viruses and disrupting computer networks.
Cyberwarfare
Large-scale hacking conducted by countries, terrorist organizations, and large, independent hacking groups.
Phishing
Luring individuals into entering personal information into a website controlled by a hacker.
A _______ uniquely identifies every network-connected device in the world
MAC address
Spyware
Malware that reports activity on your computer to another party.
_____ are pieces of a message broken down into small units by the sending device and reassembled by the receiving device
Packets
Packet
Pieces of a message broken down into small units by the sending device and reassembled by the receiving device in a network.
_____ systems can be incrementally expanded to provide increasing amounts of computer power storage, and/or software when the need arises
Scalable
_______ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs
Social engineering
____ network device provides multiple parts for connecting nodes and is aware of the exact address or identity of all the nodes attached to it
Switch
Mission-critical
Systems that must run without failure or with nearly instant recovery from failure.
Scalability
The capacity to provide increasing amounts of computing power, storage, and/or software.
Cybercrime
The use of a computer and/or network to commit a variety of crimes, such as creating viruses or disrupting networks.
Data analytics
The use of modeling software and statistics to extract knowledge from large volumes of data.
The _____ of a network is the logical layout of the cables and devices that connect the nodes of the network
Topology
Data warehouse
a central repository for data where records from multiple databases are stored
Network interface card
a computer component that translates and transmits network packets
Network
a connection between computers that allows users to communicate and share information
Node
a connection point within a network
Local are network (LAN)
a data communication system consisting of multiple devices that are relatively near each other and are connected using cables or wireless media
Bridge
a device that connects two LAN's or two segments of the same LAN; looks at the information in each packet header and forwards data traveling from one LAN to another
Distributed denial-of-service
a network attack that attempts to shut down or block access to websites
Intranet
an internal version of the Internet containing information that is restricted to a particular company's employees
Threat
anything that can cause harm
Redundant
computers that have multiple hardware systems performing the same task at the same time
Wireless access point
connects single or multiple PCs in the wireless environment
Risk assessment
identifying and examining possible threats to a computer system
Bonets
massive networks of zombies that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks
Pretexting
occurs when someone deceives by pretending to be someone else
Two-factor authentication
A feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.
Fiber-optic cable
A high-speed cable that consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
Tape library
A large storage unit that houses multiple tape drives.
Data validation
A method for checking and improving the reliability of data.
Switch
A network device that is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it, thereby increasing the efficiency of the network.
Repeater
A network device used to prevent attenuation when packets are traveling long distances.
Gateway
A node on a network that serves as an entrance to another network.
Strong password
A password that is difficult for thieves to guess or crack.
Trojan horse
A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
Ransomware
A scam that threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.
Authentication
A security measure used to confirm an individual's identity.
Authorization
A security measure used to give individuals a certain level of access based on who they are.
Management information system
A set of software tools that enables managers to gather, organize, and evaluate information.
Decision support system (DSS)
A special application that collects and reports certain types of data, thus helping managers make better decisions.
RAID
A storage system that links any number of disk drives (a disk array) so that they act as a single disk.
Virtual Private Network (VPN)
A type of connection that increases the security of network communication by employing a method called "tunneling", whereby each packet from the sending computer is encapsulated within another packet.
Transaction Processing System (TPS)
A type of information system that handles the processing and tracking of transactions.
Office automation system
A type of information system that is designed to manage information in an office environment and help users handle certain information-related tasks more efficiently.
Expert system
A type of information system that performs analytical tasks traditionally done by a human, using sequences of questions to ask and actions to take based on the responses to those questions.
Worm
A type of malware that self-replicates and spreads through computers and networks without the need to attach to a host file.
Scareware
A type of scam whose goal is to scare the user into doing exactly what the thief wants.
MAC address
A unique identifier contained in the network interface hardware of computers and other network-connected devices.
Rouge hotspot
A wireless access point set up by a hacker in a public area to intercept users' communication.
Surge protector
An inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.
Zombies
An infected and compromised computer that is under the external control of a hacker, usually without the knowledge of the computer's owner.
Countermeasure
Any step you take to ward off a threat
Wide Area Network (WAN)
The connection of two or more central computers or LANs, generally across a wide geographical area.
Data mining
The discovery of new patterns or relationships between data.
Topology
The logical layout of the cables and devices that connect the nodes of the network.
Attenuation
The loss of intensity and clarity of a transmitted data signal.
Network media
The means used to link parts of a computer network.
Ethernet
The most common physical standard for local area networks.
Wi-Fi
The most popular standard for wireless networking; also called "802.11".
Uninterpretable power supply
a device that contains both a surge protector and rechargeable battery, allowing your computer system to run for a limited amount of time during a power failure
Extranet
a service that allows an organization to share some of its intranet resources with people outside of the organization
Protocol
a set of rules or standards that must be followed by computers that wish to communicate over a network
Big data
a term that refers to the large volumes data that are constantly being generated by our devices and digital transactions
Identity theft
a type of crime in which criminals essentially assume your identity and begin to open new bank accounts under your name
Virus
a type of malware that is attached to a host file and has the ability to replicate, or copy itself.
______ is not one of the specifications of Wi-Fi technology
802.11z
Hub
A basic network device that provides multiple ports for connecting nodes.
Coaxial cable
A cable that consists of a single copper wire that is surrounded by insulation and a wire mesh shield.
Twisted-pair cable
A cable that consists of four pairs of wires that are twisted around each other. Each copper wire is insulated in plastic, and all wires are collectively bound together in a layer of plastic.
Router
A complex device that stores the routing information for networks. It looks at each packet's header to determine where the packet should go, then determines the best route for the packet to take toward its destination.
Information system
A complex system for acquiring, storing, organizing, using, and sharing data and information.
Vulnerablility
A weakness which can be exploited by a threat actor, such as an attacker
All nodes connect to a wireless ______ in order to communicate wirelessly
Access point
________ refers to the large volumes of data that are constantly being generated by our devices and digital transactions
Big Data
A popular type of network attack, known as a ______ attack, allows hackers to set down or block access to websites and other network resources by overwhelming them with requests
DDoS
Malware
a generic term to describe various kinds of malicious programs created to harm a computer or steal valuable information
Hacktivism
hacking with a social or political agenda