Chapter 5 ITECH

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

countermeasure

Any step you take to ward off a threat

packets

Data moves though networks in structures, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

identity theft

In many cases, hackers are looking for personal data that will allow them to assume the identity of another individual - a crime

data mining

Large databases that support information systems can provide an ideal environment, which is the discovery of new patterns or relationships between data.

wireless adapter

Most desktop computers require an internal or external to connect to a WAP.

intranet

Some organizations offer an internal version of the Internet, which contains only the company's private information

cybercrimes

Such crimes, from creating viruses to disrupting computer networks

network interface card (NIC)

The device at each node that performs translation and transmission

transaction processing system (TPS).

The information system that handles the processing and tracking of transactions

network media

The means used to link parts of a computer network

node

The network uses the media to carry data from one or connection point, to another.

wireless access point (WAP)

To create a wireless LAN, is needed. All nodes connect to the device.

Zombies

are infected computers that are under the external control of a hacker.

Protocols

are rules of communication that ensure packets are sent, received, and interpreted properly, and that data integrity, or accuracy, is guaranteed

distributed denial-of-service (DDoS)

attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

botnets

can be used by the hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

extranet

can be used to share some of a company's intranet resources with people outside the organization.

Fault-tolerant

computers are able to continue their operation even when problems are present.

Redundant

computers have multiple hardware systems performing the same task at the same time to protect against the failure of one system.

Coaxial cable

consists of a single copper wire that is surrounded by insulation and a wire mesh shield, all inside a plastic sheath.

fiber-optic cable

consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

Authorization

gives individuals a certain level of access based on who they are.

Phishing

involves luring individuals into entering personal information into a website controlled by the hacker.

router

is a complex device that stores the routing information for networks. Determines the best route for packets.

information system (IS)

is a complex system for acquiring, storing, organizing, using, and sharing data and information

local area network (LAN)

is a data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media.

bridge

is a device that connects two LANs or two segments of the same LAN

Social engineering

is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

gateway

is a node on a network that serves as an entrance to another network.

Trojan horse

is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

management information system (MIS)

is a set of software tools that enables managers to gather, organize, and evaluate information.

decision support system (DSS)

is a special application that collects and reports certain types of data, can help managers make better decisions.

redundant array of independent disks (RAID)

is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

expert system

is a type of information system that performs analytical tasks traditionally done by a human.

worm

is a type of malware that self-replicates and spreads through computers and networks

vulnerability

is a weakness that has not been protected against threats.

data warehouse

is an enormous digital warehouse that contains data gathered from multiple databases.

surge protector

is an inexpensive product that guards connected equipment against large power spikes or surges.

Spyware

is designed to report activity on your computer to another party.

Pretexting

is gaining someone's trust by pretending you are someone else.

switch

is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it.

Interoperability

is the ability of each organization's information system to work with the other, sharing both data and services.

Bandwidth

is the amount of data that can be transmitted over a given amount of time.

Scalability

is the capacity to provide increasing amounts of computing power, storage, and/or software.

wide area network (WAN)

is the connection of two or more central computers or LANs, generally across a wide geographical area.

Attenuation

is the loss of intensity and clarity of the data signal being transmitted. It is often affected by distance.

Ethernet

is the most widely-used standard for local area networks.

Data validation

is the process of safeguarding against erroneous or duplicate data by checking what is entered and placing restrictions on how the data is entered.

repeater

is used to prevent attenuation when packets are traveling long distances.

Twisted-pair cable

normally consists of four pairs of wires that are twisted around each other. All wires are collectively bound together in a layer of plastic that you would refer to as the network cable.

hub

provides multiple ports for connecting nodes.

Malware

refers to several types of malicious computer programs that are created to harm computer systems and their users.

Authentication

refers to the requirement that an individual confirm his or her identity.

virtual private network (VPN)

so that all of your activity will first pass through a VPN server before traveling to the Internet. This is often required by employers if you are connecting to workplace computers from home.

mission-critical

they must run without failure or with nearly instant recovery from failure

Wireless networks

use radio signals that travel through the air to transmit data.

office automation system

uses computers and/or networks to perform various office-related operations, such as word processing, accounting, document management, or communications.

risk assessment

where you identify and examine possible threats, is critical to being able to safeguard a system.

uninterruptible power supply (UPS)

which contains a battery, can keep a system on in the event of a power failure.

Hacktivism

which has a social or political agenda behind it, has become a popular reason to hack in recent years.

tape library

which is a large storage unit for magnetic tape drives, to create backups and archives of data.

rogue hotspot

which is a wireless access point that users accidentally connect to.

cyberterrorism

which is an attack that seeks to create large-scale chaos and damage to a country's infrastructure

scareware

which tricks users into following a thief's orders, malware usually tries to remain hidden from users so that it can do its damage for as long as possible.


Set pelajaran terkait

Chapter 35 Nursing Diagnosis and Planning

View Set

PSY 3341 (Exam #1 material), PSY 3341 Exam 2 Memory, PSY 3341 - Exam 2

View Set

SIE Mastery Exam 1 Review Questions

View Set

ohio life insurance exam missed questions and answers part 10

View Set

PSY 101 Macmillan Learning Launchpad

View Set

Clinical Psych Final Exam Review

View Set

MAR 5625 - Marketing Research and Analytics - Chapter 7

View Set