Key Concepts in Cybersecurity and Networking

Ace your homework & exams now with Quizwiz!

Annual expected loss from Internet connectivity loss

$1,500.

JavaScript

A JavaScript Virtual Machine is used to interpret JavaScript programming code.

Device for signal translation

A device that makes possible the translation of digital signals to analog sound signals used by a computer network is called a modem.

Field

A grouping of characters into a word, a group of words, or a complete number is called a field.

Edge computing

A method of optimizing cloud computing systems.

Integrated circuit

A multicore processor is an integrated circuit to which two or more processors have been attached, and which features enhanced performance and reduced power consumption.

Ruby on Rails

A programming language that provides a framework with tools for building feature-rich websites.

Workstation

A reason for using a workstation rather than a personal computer is when you need more powerful computational abilities.

Legacy system

A transaction processing system running on a mainframe is an example of a legacy system.

Logical database model

A type that treats data as if they were stored in two-dimensional tables.

Internet of Things

A vision of a pervasive Internet/Web, where common objects are connected to and controlled via the Internet.

Computer crime

Accessing a computer system without authority is not an example of a computer as a target of crime.

Search engine marketing

Accounts for almost 70 percent of digital ad spending.

Legislation on security breaches

All 50 states require notification of individuals of security breaches involving personally identifiable information.

JavaScript

All major web browsers have a built-in JavaScript engine.

ZipRealty

An example of a mashup that combines Google Maps with real estate data.

Linux

An example of open-source software.

Software used to create an invoice

An example of systems software.

Software-defined storage

An example of virtualization.

Amazon

An online retailer that is also a powerful product search engine.

Android

An open-source operating system designed for mobile devices.

Implementation controls

Apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.

Implementation controls

Audit the systems development process at various points to ensure that the process is properly controlled and managed.

Computer networks

Based on the same principles as traditional telephone networks.

Evil twins

Bogus wireless network access points that look legitimate to users.

Schematic for table relationships in a database

Called an entity-relationship diagram.

Implementation controls

Can be classified as input controls, processing controls, and output controls.

Web servers

Can directly access a firm's back-end databases using HTML.

Web services

Can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based.

HTML

Can perform presentation, communication, and storage of data.

WiMax standard transmission distance

Can transmit up to approximately 30 miles.

Client/server computing

Client/server computing is the most widely used form of centralized processing.

Rows in a table

Commonly referred to as records.

Internet backbone networks

Companies that own Internet backbone networks are called IXPs.

Internet backbone networks

Companies that own Internet backbone networks are called Tier 1 ISPs.

Internet backbone networks

Companies that own Internet backbone networks are called Tier 2 ISPs.

Internet backbone networks

Companies that own Internet backbone networks are called Tier 3 ISPs.

Internet backbone networks

Companies that own Internet backbone networks are called transcontinental ISPs.

Evil twins

Computers that fraudulently access a website or network using the IP address and identification of an authorized computer.

5G

Designed to support the transmission of data in the gigabit range.

DoS attacks

DoS attacks flood a network server with thousands of requests for service.

Evil twins

Email messages that mimic the email messages of a legitimate business.

Data governance

Encompasses an organization's policies and procedures for managing data as an organizational resource.

SaaS

Focuses on the provision of infrastructure and programming tools that allow customers to develop their own applications.

Evil twins

Fraudulent websites that mimic a legitimate business's website.

Implementation controls

Govern the design, security, and use of computer programs and the security of data files in general throughout the organization.

Relational database

In a relational database, a table contains all of the following except three-dimensional relations.

Third-level domain

In the domain name 'books.pearson.com', the third-level domain is 'books'.

Implementation controls

Include software controls, computer operations controls, and administrative controls.

Traditional storage technologies

Includes optical drives, magnetic tape, magnetic disks, but not cloud computing.

JavaScript

JavaScript can be used to instruct a computer on how to interact with a user on receiving user input.

JavaScript

JavaScript is the foundation technology for web services.

XML

Limited to describing how data should be presented in the form of web pages.

ICANN

Manages the domain name system.

Digital information transmission

Measured in bps.

Search engines

Mobile search on mobile devices now makes up the majority of all searches.

Data quality problems

Most stem from errors during data input.

Cloud computing

Not an essential characteristic of cloud computing, as defined by the US National Institute of Standards and Technology (NIST), is open-source software.

Zero-trust framework

Only computers behind a corporate firewall are trusted by default.

Hadoop

Particularly useful in analyzing larger data sets of Big Data.

Most computer viruses deliver a

Payload.

Phishing

Phishing is a form of spoofing.

Analytic platforms

Preconfigured hardware-software systems specifically designed for query processing and analytics.

What-if analysis

Prepared using spreadsheet software.

Wireless sensor networks (WSNs) tasks

Processing consumer transactions.

Open-source software

Provides users with free access to its program code.

RFID

RFIDs require line-of-sight contact to be read.

RFID

RFIDs transmit only over a short range.

Relational databases

Relational databases organize data into two-dimensional tables called relations.

Computer network requirement

Requires at least two computers.

Sniffers

Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.

Data governance policy

Specifies the procedures and rules for defining the content of corporate databases.

Data governance policy

Specifies where information can be distributed, which users can share information, who is responsible for maintaining information, the structure of the company's database, and how data resources should be secured.

Cost analysis model

TCO model can be used to analyze direct and indirect costs to help determine the actual cost of a specific technology implementation.

Remote logon service

Telnet enables remote logon onto another computer.

Customer profile data storage

Yile Technology chose Amazon Web Service's Simple DB to store its game's customer profile data.

Network processing

The use of multiple computers linked by a communications network for processing is called network computing.

Network processing

The use of multiple computers linked by a communications network for processing is called supercomputing.

Search engines

There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

Search engines

They aim to enable users to instantly find information on the web.

Search engines

They can be gamed by scammers.

Search engines

They have become major advertising platforms.

Comprehensive security management products

Tools for firewalls, VPNs, intrusion detection systems, and more.

Bandwidth

Total number of bytes that can be sent through a medium per second.

Supercomputer

Traditionally used for scientific exploration and simulations.

Evil twins

Trojan horses that appear to the user to be a legitimate commercial software application.

Network type

Used to connect digital devices within a city or metropolitan area.

OLAP

Used to quickly find answers to ad hoc questions.

Internet technologies

The Internet is based on TCP/IP, HTTP, and packet switching.

Text mining

The discovery of useful patterns on the web.

The Internet

The largest implementation of client/server computing.

JavaScript

The majority of websites use JavaScript for client-side page behavior.

Select operation

The select operation creates a subset consisting of all records in the file that meet stated criteria.

Traditional telephone system

The traditional telephone system is an example of a circuit-switched network.

Network type for small business

The type of network that would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents, is a peer-to-peer network.

Software management

The type of software that manages the resources and activities of a computer is called system software.

Network processing

The use of multiple computers linked by a communications network for processing is called centralized processing.

Network processing

The use of multiple computers linked by a communications network for processing is called decentralized computing.

Network processing

The use of multiple computers linked by a communications network for processing is called distributed processing.

Data warehouse

Well suited for organizing and analyzing Big Data.


Related study sets

Chapter 12: Food Safety Concerns

View Set

Prep U: Chapter 15: Postpartum Adaptations

View Set