MIS142 Chapter 5

Ace your homework & exams now with Quizwiz!

Fault-tolerant

systems that are able to continue their operation even when problems are present

Interoperability

the ability to exchange and use computer information within and across networks

Wireless network

use radio or infrared signals that travel through the air to transmit data

Social Engineering

A form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

Business intelligence (BI)

A framework that encompasses all of the data, tools, and strategies used by businesses to improve decision making and make predictions.

An _____ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in a knowledge base

Expert

Systems known as ______ are able to continue their operation, even when problems are present

Fault-tolerant

Many thieves use the temptation of free (illegal) software on _______ services to lure individuals into downloading malware

File-sharing

Bandwidth

In networks, it refers to the amount of data that can be transmitted over a given amount of time.

Hacker

In the negative sense, this term refers to an individual who uses a computer and/or network to commit a variety of crimes, such as creating viruses and disrupting computer networks.

Cyberwarfare

Large-scale hacking conducted by countries, terrorist organizations, and large, independent hacking groups.

Phishing

Luring individuals into entering personal information into a website controlled by a hacker.

A _______ uniquely identifies every network-connected device in the world

MAC address

Spyware

Malware that reports activity on your computer to another party.

_____ are pieces of a message broken down into small units by the sending device and reassembled by the receiving device

Packets

Packet

Pieces of a message broken down into small units by the sending device and reassembled by the receiving device in a network.

_____ systems can be incrementally expanded to provide increasing amounts of computer power storage, and/or software when the need arises

Scalable

_______ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs

Social engineering

____ network device provides multiple parts for connecting nodes and is aware of the exact address or identity of all the nodes attached to it

Switch

Mission-critical

Systems that must run without failure or with nearly instant recovery from failure.

Scalability

The capacity to provide increasing amounts of computing power, storage, and/or software.

Cybercrime

The use of a computer and/or network to commit a variety of crimes, such as creating viruses or disrupting networks.

Data analytics

The use of modeling software and statistics to extract knowledge from large volumes of data.

The _____ of a network is the logical layout of the cables and devices that connect the nodes of the network

Topology

Data warehouse

a central repository for data where records from multiple databases are stored

Network interface card

a computer component that translates and transmits network packets

Network

a connection between computers that allows users to communicate and share information

Node

a connection point within a network

Local are network (LAN)

a data communication system consisting of multiple devices that are relatively near each other and are connected using cables or wireless media

Bridge

a device that connects two LAN's or two segments of the same LAN; looks at the information in each packet header and forwards data traveling from one LAN to another

Distributed denial-of-service

a network attack that attempts to shut down or block access to websites

Intranet

an internal version of the Internet containing information that is restricted to a particular company's employees

Threat

anything that can cause harm

Redundant

computers that have multiple hardware systems performing the same task at the same time

Wireless access point

connects single or multiple PCs in the wireless environment

Risk assessment

identifying and examining possible threats to a computer system

Bonets

massive networks of zombies that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks

Pretexting

occurs when someone deceives by pretending to be someone else

Two-factor authentication

A feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.

Fiber-optic cable

A high-speed cable that consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

Tape library

A large storage unit that houses multiple tape drives.

Data validation

A method for checking and improving the reliability of data.

Switch

A network device that is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it, thereby increasing the efficiency of the network.

Repeater

A network device used to prevent attenuation when packets are traveling long distances.

Gateway

A node on a network that serves as an entrance to another network.

Strong password

A password that is difficult for thieves to guess or crack.

Trojan horse

A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Ransomware

A scam that threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.

Authentication

A security measure used to confirm an individual's identity.

Authorization

A security measure used to give individuals a certain level of access based on who they are.

Management information system

A set of software tools that enables managers to gather, organize, and evaluate information.

Decision support system (DSS)

A special application that collects and reports certain types of data, thus helping managers make better decisions.

RAID

A storage system that links any number of disk drives (a disk array) so that they act as a single disk.

Virtual Private Network (VPN)

A type of connection that increases the security of network communication by employing a method called "tunneling", whereby each packet from the sending computer is encapsulated within another packet.

Transaction Processing System (TPS)

A type of information system that handles the processing and tracking of transactions.

Office automation system

A type of information system that is designed to manage information in an office environment and help users handle certain information-related tasks more efficiently.

Expert system

A type of information system that performs analytical tasks traditionally done by a human, using sequences of questions to ask and actions to take based on the responses to those questions.

Worm

A type of malware that self-replicates and spreads through computers and networks without the need to attach to a host file.

Scareware

A type of scam whose goal is to scare the user into doing exactly what the thief wants.

MAC address

A unique identifier contained in the network interface hardware of computers and other network-connected devices.

Rouge hotspot

A wireless access point set up by a hacker in a public area to intercept users' communication.

Surge protector

An inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

Zombies

An infected and compromised computer that is under the external control of a hacker, usually without the knowledge of the computer's owner.

Countermeasure

Any step you take to ward off a threat

Wide Area Network (WAN)

The connection of two or more central computers or LANs, generally across a wide geographical area.

Data mining

The discovery of new patterns or relationships between data.

Topology

The logical layout of the cables and devices that connect the nodes of the network.

Attenuation

The loss of intensity and clarity of a transmitted data signal.

Network media

The means used to link parts of a computer network.

Ethernet

The most common physical standard for local area networks.

Wi-Fi

The most popular standard for wireless networking; also called "802.11".

Uninterpretable power supply

a device that contains both a surge protector and rechargeable battery, allowing your computer system to run for a limited amount of time during a power failure

Extranet

a service that allows an organization to share some of its intranet resources with people outside of the organization

Protocol

a set of rules or standards that must be followed by computers that wish to communicate over a network

Big data

a term that refers to the large volumes data that are constantly being generated by our devices and digital transactions

Identity theft

a type of crime in which criminals essentially assume your identity and begin to open new bank accounts under your name

Virus

a type of malware that is attached to a host file and has the ability to replicate, or copy itself.

______ is not one of the specifications of Wi-Fi technology

802.11z

Hub

A basic network device that provides multiple ports for connecting nodes.

Coaxial cable

A cable that consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

Twisted-pair cable

A cable that consists of four pairs of wires that are twisted around each other. Each copper wire is insulated in plastic, and all wires are collectively bound together in a layer of plastic.

Router

A complex device that stores the routing information for networks. It looks at each packet's header to determine where the packet should go, then determines the best route for the packet to take toward its destination.

Information system

A complex system for acquiring, storing, organizing, using, and sharing data and information.

Vulnerablility

A weakness which can be exploited by a threat actor, such as an attacker

All nodes connect to a wireless ______ in order to communicate wirelessly

Access point

________ refers to the large volumes of data that are constantly being generated by our devices and digital transactions

Big Data

A popular type of network attack, known as a ______ attack, allows hackers to set down or block access to websites and other network resources by overwhelming them with requests

DDoS

Malware

a generic term to describe various kinds of malicious programs created to harm a computer or steal valuable information

Hacktivism

hacking with a social or political agenda


Related study sets

Chapter 6 Medication Order Entry and Fill Process

View Set

Ch. 8 Female Reproductive System

View Set

RSE Ch. 7 Access Control Lists (ACLs)

View Set