MIST Part A Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is database management? DBMS?

The software application that lets you create and work with a database

Types of relationships (1:1, 1:m, m:m)

1:1- when an instance of one entity can have a relationship with one and only one instance of the other entity 1:M- when an instance of the first entity can have a relationship with one or more instances of the second entity, but instances of the second entity can be related to only one instance of the first M:M- When instances of each entity can be related to one or more instance of the other entity

Database vs. spreadsheet as a tool for data storage

A database allows for security, the elimination of redundant data, data access (multiple types of users can query a single database simultaneously) and big data (Volume, variety and velocity)

AIC Triad (Availability, Integrity, Confidentiality)

AIC Triad is the heart of information security Availability: refers to the ability for authorized parties to access data and systems when necessary Data integrity: means maintaining and assuring the accuracy and reliability of the information and systems over its lifecycle Confidentiality: the property that information is not disclosed or otherwise made available to unauthorized viewers of information

Specifically, I want you to recognize the tension that exists between a digital currency and the free, perfect, instant properties of digital information goods.

BTC should NOT follow free perfect and instant

"Best practice" security control illustrations (e.g., continuity planning, employment/HR, data management)

Business Continuity Planning: tactical plan for quickly resuming your firm's business operations after a catastrophe Employees: rotation of duties, mandatory vacations, split knowledge, dual control and strict procedure for employee termination Data management: unlink sensitive data from other data to minimize the damage if its stolen

Definitions of the core vs. the crowd

Core: dominant organizations, institutions, groups and processes of the pre-interent era The Crowd: New participants and practices enabled by the net and its attendant technologies

The "stories" behind the hacking methods illustrated in the in-class video

Girl logging into cell phone company

Ways to organize the crowd (e.g., formal hierarchies, markets, self-organizing structures like Wikipedia/Open Source)

Hierarchal organization--> employment relationship inside the firm Non-Hierarchal--> markets can focus information flow or have self-organizating structures (ex wiki) and if they do have self organizing structures then the following are needed: Openness Noncredentialism verifiable and reversible contributions clear outcomes self-organization geeky leadership as well as labor resources and information

Ox weight example (incl. the four criteria to make crowd-based estimation effective)

Independence, diversity, decentralization, aggregation

Conventional technical approaches to security (e.g., MFA, monitoring, software updates)

Multi-factor authentication: something you know, have or are Monitoring and anomaly detection: intrusion detection, intrusion prevention Software updates; routine patching of newly-discovered vulnerabilities

Primary keys and foreign keys

Primary key- an attribute that can have a unique value for every instance (record) that you store in a table Foreign key- the primary key in another table

Shortfalls of the conventional technical approach (e.g., Social engineering, insider threats)

Skilled hackers prefer social engineering attacks over brute force attacks Biometric authentication and MFA prevent attacks from outsiders but not bad insiders --> "insider threats" include both negligence and malice

Problems arising from the non-hierarchical/messy crowd

Two difficult problems: it can be hard to find what you're looking for in an ocean of uncontrolled information some of its members behave in hurtful ways

Relationship between security controls and security frameworks

administrative controls, technical controls and physical controls should be utilized to achieve security management directives

Cryptocurrencies and the blockchain

blockchain acts as a distributed/ decentralized ledger system that logs transactions

Major components of a relational database model (entities, attributes, relationships)

entities: data is stored data in one more more tables corresponding; things and concepts for which you wish to store data in the database relationships: entities are connected through these attributes: store data on a single instance of an entity, consists of one more more fields

The role of good management in the companies of the future; how to lead effectively

social skills of coordination, negation, persuasion and social perceptiveness

When and why outsiders can be more effective than experts

the crowd is valuable because its massively marginal


संबंधित स्टडी सेट्स

FoRT practice test (multiple choice only)

View Set

Chapter 08 - Understanding Human Sexuality - Hyde - study guide

View Set

Essentials of Leadership Chapter 8 Quiz

View Set