1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
... are locations with one or more access points providing wireless Internet access and are often in public places. Some are free or do not require any additional software to use; others may require activation and the establishment of a user account by providing a credit card number over the web.
hotspots
Packet ... is a method of slicing digital messages into parcels called packets, sending the packets along different communication paths as they be-come available, and then reassembling the packets once they arrive at their destinations
switching
A ... is a secure, encrypted, private network that has been configured within a public network to take advantage of the economies of scale and management facilities of large networks, such as the Internet.
virtual private network
With continuing telecommunications deregulation and information technology innovation, telephone and computer networks are converging into a single ... network using shared Internet-based standards and technology.
digital
.../... computing is a distributed computing model in which some of the processing power is located within small, inexpensive client computers and resides literally on desktops or laptops or in handheld devices. It has largely replaced centralized mainframe comput-ing in which nearly all the processing takes place on a central large mainframe computer.
(two words, seperated by a / )
client/server
... pulls specified content from websites and feeds it automatically to users’ computers. Its reader software gathers material from the websites or blogs that you tell it to scan and brings new information from those sites to you. Such readers are available through websites such as Google and Yahoo, and they have been incorporated into the major web browsers and email programs.
Rich Site Summary
Voice and data communication, as well as Internet access, are taking place over ... wireless platforms such as mobile phones, mo-bile handheld devices, and PCs in wireless networks.
broadband
The directory path and web page name are two more pieces of information within the web address that help the browser track down the requested page. Together, the address is called a ... . When typed into a browser, it tells the browser software exactly where to look for the information.
uniform resource locator
... technology delivers voice infor-mation in digital form using packet switching, avoiding the tolls charged by local and long-distance telephone networks
voice over IP
... integrates disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience by which users can seamlessly switch back and forth between different communication modes.
Unified communications
A ... consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
security policy
... uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices to grant or deny access. It is based on the measurement of a physical or behavioral trait that makes each individual unique. It compares a person’s unique characteristics, such as the fingerprints, face, voice, or retinal image, against a stored profile of these characteristics to determine any differences between these characteristics and the stored profile. If the two profiles match, access is granted.
biometric authentication
A ... is an individual who intends to gain unauthorized access to a computer system. They gain unauthorized access by finding weaknesses in the security protections websites and computer systems employ.
hacker
Hacker activities have broadened beyond mere system intrusion to include theft of goods and information as well as system damage and ... , the intentional disruption, defacement, or even destruction of a website or corporate information system.
cybervandalism
Especially prevalent today are drive-by downloads , consisting of malware that comes with a downloaded ... that a user intentionally or unintentionally requests.
file
... are independent computer programs that copy themselves from one computer to other computers over a network. They can operate on their own without attaching to other computer program files and rely less on human behavior to spread rapidly from computer to computer. They destroy data and programs as well as disrupt or even halt the operation of computer networks.
worms
... monitor the use of system software and prevent unauthorized access and use of software programs, system software, and computer programs.
software controls
A ... is a physical device, similar to an identification card, that is designed to prove the identity of a single user. They are small gadgets that typically fit on key rings and display passcodes that change frequently.
token
Malicious software programs are referred to as ... and include a variety of threats such as computer viruses, worms, and Trojan horses.
malware
An information systems ... examines the firm’s overall security environment as well as controls governing individual information systems. It should trace the flow of sample transactions through the system and perform tests, using, if appropriate, automated audit software. It may also examine data quality
audit