MIS Final

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/116

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

117 Terms

1
New cards

database

collection of data that is self-described

2
New cards

deletion anomaly

deleting in one file, but not others

3
New cards

insertion anomaly

inserting data in one file, but not others

4
New cards

update anomaly

only updating in one location

5
New cards
<p>primary key</p>

primary key

unique identifier, doesn’t change, defined within table

6
New cards
<p>foreign key</p>

foreign key

column or set of columns in a table that refers to the primary key of another table, creates relationships between tables, maintains referential integrity, and data consistency

7
New cards
<p>Structured Query Language</p>

Structured Query Language

standardized language to manage and manipulate databases and extracting data (SELECT, INSERT, UPDATE)

8
New cards
<p>table</p>

table

one sheet of data- group of related records/rows

9
New cards
<p>row (record)</p>

row (record)

one complete set of related data about a single item

10
New cards
<p>column (field)</p>

column (field)

category or attribute (eg. FirstName, LastName, PhoneNumber)

11
New cards

character

single letter, number, or symbol

12
New cards

byte

unit of storage for one character

13
New cards

tables/files

where data is stored

14
New cards
<p>metadata</p>

metadata

data about data (file creation/modification date. who modified, owner, data type)

15
New cards

user

people interacting with system

16
New cards

Database management system

software that creates, manages, and provides access to the database (Oracle, Access)

17
New cards

DBMS operations

read, insert, modify, delete

18
New cards
<p>entity relationship model</p>

entity relationship model

visually represent data structure

19
New cards

entity

things we store data about

20
New cards

relationships

how entities are connected

21
New cards

crow foot diagram

shows ER between tables

22
New cards

cardinality

how many of one entity relates to another -

Zero or One (Optional One): O| (Ring and Dash) - Minimum zero, maximum one.

One and Only One (Mandatory One): || (Dash and Dash) - Minimum one, maximum one.

Zero or Many (Optional Many): O< (Ring and Crow's Foot) - Minimum zero, maximum many.

One or Many (Mandatory Many): |< (Dash and Crow's Foot) - Minimum one, maximum many. 

23
New cards

query

requests information

24
New cards
<p>attribute</p>

attribute

either primary or foreign key

25
New cards

normalization/centralization

put data into related tables

26
New cards

denormalization

combining into one table

27
New cards
<p>NoSQL</p>

NoSQL

nonrelational databases-manage large data sets between platforms

28
New cards

big data

tools for working with large data

29
New cards

volume

scale of data

30
New cards

variety

different forms of data

31
New cards

veracity

uncertainty of data

32
New cards

velocity

analysis of streaming data

33
New cards

CISO Role (Chief Information Security Officer)

develop policies, minimize risk, handle incidents

34
New cards

gen AI

double-edged sword- used for defense simulations and creating sophisticated attacks

35
New cards

threat

event with potential for asset loss (phishing, malware)

36
New cards

vulnerability

weaknesses in design or control (weak passwords, unpatched software)

37
New cards

exploit

technique used to compromise vulnerability (SQL injections)

38
New cards

social engineering definition

manipulating people into divulging confidential info

39
New cards

tactics of social engineering

phishing emails, pretexting, & baiting

40
New cards

mitigation for social engineering attacks

education and “zero trust” policies

41
New cards

malware: ransomware

encrypts data and demands payment for the key

42
New cards

keyloggers

records keystrokes to steal passwords and data

43
New cards

rootkits

hides in OS to allow remote control and bypass security

44
New cards

bots & botnets

compromised computers controlled centrally for attacks (DDoS)

45
New cards

virus

self-replicating programs that infect a host to cause damage

46
New cards

trojan horses

disguised as legitimate software but performs malicious activity

47
New cards

man-in-the-middle (MitM) & MitMo

intercept communication on web & mobile

48
New cards

SQL injection

inserting malicious code into database queries via web forms

49
New cards

kerberoasting

brute-forcing service account passwords in active directory

50
New cards

supply chain attacks

infiltrating a system through a third-party vendor

51
New cards

CIA triad: confidentiality

prevent unauthorized access (encryption, access controls)

52
New cards

CIA triad: integrity

ensure data accuracy and consistency (checksums, backups)

53
New cards

CIA triad: availability

ensuring data is accessible when needed (redundancy, DRP)

54
New cards

data in transit

move across networks (protected by Transport Layer Security/Secure Socket Layer

55
New cards

data at rest

stored on disk/servers (protected by disk encryption)

56
New cards

data in process

currently in RAM/CPU (most vulnerable)

57
New cards

nist framework: identify

asset management & risk assessment

58
New cards

nist framework: protect

access control & training

59
New cards

nist framework: detect

monitoring & anomaly detection

60
New cards

nist framework: respond

mitigation & communication

61
New cards

nist framework: recover

restoration & improvement

62
New cards

risk analysis steps

  1. value assets

  2. est. loss

  3. est. likelihood

  4. calc costs

  5. decide countermeasures

63
New cards

probable maximum loss (pml)

worse-case scenario cost

64
New cards

identity verification

multi-factor authentication, biometrics, token-based authentication

65
New cards

plan, protect, respond

cycle of continuous security improvement

66
New cards

identity first security

focus on user identity as the perimeter

67
New cards

security culture

moving beyond tools to behavioral change

68
New cards

hybrid environment

securing both on-prem and cloud resources

69
New cards

physical controls

fence, gate, camera

70
New cards

technical controls

firewalls, intrusion detection/prevention systems, network segmentation, antivirus

71
New cards

administrative controls

hiring & termination policies, data classification, separation of duties

72
New cards

types of security controls

preventative

deterrent

detective

corrective

compensating

directive

73
New cards

7-step cybersecurity plan

  1. risk assessment,

  2. define goals & policies,

  3. identify & enact defenses,

  4. create response & recovery plans,

  5. address legal & compliance,

  6. train personnel,

  7. continuous monitoring

74
New cards

software acquisition

  1. needs assessment

  2. budget analysis,

  3. research & selection

  4. evaluate vendors

  5. deployment

75
New cards

database hierarchy

  1. table/file

  2. record within a table

  3. field within a record

  4. characters within a field

76
New cards

components of a database

  1. tables

  2. relationships between rows

  3. metadata

77
New cards

enterprise database

100+ users

78
New cards

personal database

less than 100 users

79
New cards

threat actor

cyberattack

80
New cards

cybercriminal

attack for money

81
New cards

script kiddie

automated attack

82
New cards

broker

sells knowledge

83
New cards

cyberterrorist

causes disruption and panic

84
New cards

hacktivist

targets specific organizations they disagree with

85
New cards

state actor

government-led attacks against people

86
New cards

types of NoSQL

  1. key-value stores

  2. document databases

  3. wide-column (column family) stores

  4. graph databases

87
New cards

data warehouse

large enterprise wide, integrate data from multiple sources

88
New cards

data mart

smaller subset of a warehouse, focused on one single department or function

89
New cards

web mining

for unstructured data online, analyze web pages, user behavior, and the structure of hyperlinks

90
New cards

data mining

finding patterns and relationships with structured data

91
New cards

online analytical processing data cube

organizes business data (like sales, inventory) by categories (dimensions like time, product, region) to allow for fast, flexible analysis, letting users quickly "slice, dice, drill down, and roll up" data to see trends, not just rows and columns.

92
New cards

database administrator role

maintains and manages the performance and availability of database systems

93
New cards

data scientist

analyze data, discover trends, and relationships

94
New cards

committing data

permanently saves all changes made

95
New cards

rollback data

undoes all changes made within a transaction since the last commit

96
New cards

data auditing

review data

97
New cards

data scrubbing

finding and fixing inaccurate data

98
New cards

prescriptive analytics

recommending a course of action for the predictive outcome

99
New cards

data project life cycle

  1. sensing- identify meaningful data

  2. collection- gather data

  3. wrangling- convert to user-friendly format

  4. analysis

  5. storage

100
New cards

data-driven decision making

  1. ask

  2. prepare

  3. process

  4. analysis

  5. share

  6. act