Key Concepts in Cybersecurity and Networking
Annual expected loss from Internet connectivity loss
$1,500.
JavaScript
A JavaScript Virtual Machine is used to interpret JavaScript programming code.
Device for signal translation
A device that makes possible the translation of digital signals to analog sound signals used by a computer network is called a modem.
Field
A grouping of characters into a word, a group of words, or a complete number is called a field.
Edge computing
A method of optimizing cloud computing systems.
Integrated circuit
A multicore processor is an integrated circuit to which two or more processors have been attached, and which features enhanced performance and reduced power consumption.
Ruby on Rails
A programming language that provides a framework with tools for building feature-rich websites.
Workstation
A reason for using a workstation rather than a personal computer is when you need more powerful computational abilities.
Legacy system
A transaction processing system running on a mainframe is an example of a legacy system.
Logical database model
A type that treats data as if they were stored in two-dimensional tables.
Internet of Things
A vision of a pervasive Internet/Web, where common objects are connected to and controlled via the Internet.
Computer crime
Accessing a computer system without authority is not an example of a computer as a target of crime.
Search engine marketing
Accounts for almost 70 percent of digital ad spending.
Legislation on security breaches
All 50 states require notification of individuals of security breaches involving personally identifiable information.
JavaScript
All major web browsers have a built-in JavaScript engine.
ZipRealty
An example of a mashup that combines Google Maps with real estate data.
Linux
An example of open-source software.
Software used to create an invoice
An example of systems software.
Software-defined storage
An example of virtualization.
Amazon
An online retailer that is also a powerful product search engine.
Android
An open-source operating system designed for mobile devices.
Implementation controls
Apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.
Implementation controls
Audit the systems development process at various points to ensure that the process is properly controlled and managed.
Computer networks
Based on the same principles as traditional telephone networks.
Evil twins
Bogus wireless network access points that look legitimate to users.
Schematic for table relationships in a database
Called an entity-relationship diagram.
Implementation controls
Can be classified as input controls, processing controls, and output controls.
Web servers
Can directly access a firm's back-end databases using HTML.
Web services
Can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based.
HTML
Can perform presentation, communication, and storage of data.
WiMax standard transmission distance
Can transmit up to approximately 30 miles.
Client/server computing
Client/server computing is the most widely used form of centralized processing.
Rows in a table
Commonly referred to as records.
Internet backbone networks
Companies that own Internet backbone networks are called IXPs.
Internet backbone networks
Companies that own Internet backbone networks are called Tier 1 ISPs.
Internet backbone networks
Companies that own Internet backbone networks are called Tier 2 ISPs.
Internet backbone networks
Companies that own Internet backbone networks are called Tier 3 ISPs.
Internet backbone networks
Companies that own Internet backbone networks are called transcontinental ISPs.
Evil twins
Computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
5G
Designed to support the transmission of data in the gigabit range.
DoS attacks
DoS attacks flood a network server with thousands of requests for service.
Evil twins
Email messages that mimic the email messages of a legitimate business.
Data governance
Encompasses an organization's policies and procedures for managing data as an organizational resource.
SaaS
Focuses on the provision of infrastructure and programming tools that allow customers to develop their own applications.
Evil twins
Fraudulent websites that mimic a legitimate business's website.
Implementation controls
Govern the design, security, and use of computer programs and the security of data files in general throughout the organization.
Relational database
In a relational database, a table contains all of the following except three-dimensional relations.
Third-level domain
In the domain name 'books.pearson.com', the third-level domain is 'books'.
Implementation controls
Include software controls, computer operations controls, and administrative controls.
Traditional storage technologies
Includes optical drives, magnetic tape, magnetic disks, but not cloud computing.
JavaScript
JavaScript can be used to instruct a computer on how to interact with a user on receiving user input.
JavaScript
JavaScript is the foundation technology for web services.
XML
Limited to describing how data should be presented in the form of web pages.
ICANN
Manages the domain name system.
Digital information transmission
Measured in bps.
Search engines
Mobile search on mobile devices now makes up the majority of all searches.
Data quality problems
Most stem from errors during data input.
Cloud computing
Not an essential characteristic of cloud computing, as defined by the US National Institute of Standards and Technology (NIST), is open-source software.
Zero-trust framework
Only computers behind a corporate firewall are trusted by default.
Hadoop
Particularly useful in analyzing larger data sets of Big Data.
Most computer viruses deliver a
Payload.
Phishing
Phishing is a form of spoofing.
Analytic platforms
Preconfigured hardware-software systems specifically designed for query processing and analytics.
What-if analysis
Prepared using spreadsheet software.
Wireless sensor networks (WSNs) tasks
Processing consumer transactions.
Open-source software
Provides users with free access to its program code.
RFID
RFIDs require line-of-sight contact to be read.
RFID
RFIDs transmit only over a short range.
Relational databases
Relational databases organize data into two-dimensional tables called relations.
Computer network requirement
Requires at least two computers.
Sniffers
Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.
Data governance policy
Specifies the procedures and rules for defining the content of corporate databases.
Data governance policy
Specifies where information can be distributed, which users can share information, who is responsible for maintaining information, the structure of the company's database, and how data resources should be secured.
Cost analysis model
TCO model can be used to analyze direct and indirect costs to help determine the actual cost of a specific technology implementation.
Remote logon service
Telnet enables remote logon onto another computer.
Customer profile data storage
Yile Technology chose Amazon Web Service's Simple DB to store its game's customer profile data.
Network processing
The use of multiple computers linked by a communications network for processing is called network computing.
Network processing
The use of multiple computers linked by a communications network for processing is called supercomputing.
Search engines
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
Search engines
They aim to enable users to instantly find information on the web.
Search engines
They can be gamed by scammers.
Search engines
They have become major advertising platforms.
Comprehensive security management products
Tools for firewalls, VPNs, intrusion detection systems, and more.
Bandwidth
Total number of bytes that can be sent through a medium per second.
Supercomputer
Traditionally used for scientific exploration and simulations.
Evil twins
Trojan horses that appear to the user to be a legitimate commercial software application.
Network type
Used to connect digital devices within a city or metropolitan area.
OLAP
Used to quickly find answers to ad hoc questions.
Internet technologies
The Internet is based on TCP/IP, HTTP, and packet switching.
Text mining
The discovery of useful patterns on the web.
The Internet
The largest implementation of client/server computing.
JavaScript
The majority of websites use JavaScript for client-side page behavior.
Select operation
The select operation creates a subset consisting of all records in the file that meet stated criteria.
Traditional telephone system
The traditional telephone system is an example of a circuit-switched network.
Network type for small business
The type of network that would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents, is a peer-to-peer network.
Software management
The type of software that manages the resources and activities of a computer is called system software.
Network processing
The use of multiple computers linked by a communications network for processing is called centralized processing.
Network processing
The use of multiple computers linked by a communications network for processing is called decentralized computing.
Network processing
The use of multiple computers linked by a communications network for processing is called distributed processing.
Data warehouse
Well suited for organizing and analyzing Big Data.