Comsci final

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/116

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

117 Terms

1
New cards

Risk Management

the process of placing safeguards in place to reduce the vulnerability to a risk.

2
New cards

IS Risk Assessment

Risk Assessment is the process of evaluating the potential vulnerability of IS systems. The same can be said for any technology-based system. In fact, we often use risk assessment for processes and projects

3
New cards

Pretexting

deceiving by pretending to be someone else

4
New cards

Phishing

obtaining unauthorized access to data via email

5
New cards

Spoofing

someone pretending to be someone else

6
New cards

Sniffing

intercepting computer communications

7
New cards

Usurping

invading a computer system and replacing legitimate programs with their own unauthorized programs that disrupt services unauthorized programs

8
New cards

Malware

Viruses, Worms, Trojan Horse, Spyware and Adware

9
New cards

Virus

s a computer program that replicates itself ultimately consuming the computer's resources

10
New cards

Worms

are viruses that propagate themselves using the Internet or other computer networks

11
New cards

Spyware/Adware

invade your computer and capture keystroke information. Spyware does so for malicious reasons and Adware just does so to report activity to allow for targeted ads.

12
New cards

Beacons

are tiny files that gather demographic information about you. Your info can then be sold several times a day and constitute a profile of your likes and habits. Lotame Solutions specializes in Beacons.

13
New cards

Bot

is a new term for the family of Viruses, Worms, Trojan Horse, Spyware and Adware

14
New cards

Bot Herder

refers to the individual or organization that controls the Bots. North Korean Army is responsible for most bots in the US since 2009. The Chinese Army is another primary source of Bots Army

15
New cards

Honeypots

are false targets for criminals to attack

16
New cards

Electronic counter measures to reduce vulnerabilities to cyber attacks

Firewalls Encryption Additional passwords Antispyware/anti-adware software backups/ RAID, off-site backup storage

17
New cards

Internet

A worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals

18
New cards

ARPANET's two main goals

Allow scientists at different physical locations to share information and work together

19
New cards

Function even if part of the network were disabled or destroyed by a disaster

20
New cards

Two ways to connect to the internet:

Wired connections, a computer or device physically attaches via a cable or wire to a communications device

21
New cards

Computers without a communications device can use a wireless modem hooked to USB port using a cellular connection

22
New cards

Three ways we make up a wired connection

Cabe Internet service

23
New cards

DSL (digital subscriber line)

24
New cards

Fiber to the Premises (FTTP)

25
New cards

Four ways to make up a wireless connection

Wi-Fi (wireless fidelity)

26
New cards

Mobile Broadband

27
New cards

Fixed Wireless

28
New cards

Satellite Internet Service

29
New cards

Cybercafé

A location that provides computers with Internet access, usually for a fee.

30
New cards

Hotspot

A wireless network that provides Internet connections to mobile computers and devices

31
New cards

Internet service provider (ISP)

is a business that provides individuals and organizations access to the Internet free or for a fee

32
New cards

Bandwidth

Represent the amount of data that travels over a network. A cable connection usually has a higher bandwidth than a wired bandwidth. AT&T provides a wired connection and Charter or Spectrum or Comcast provide a cable connection.

33
New cards

IP address

A sequence of numbers that uniquely identifies each computer or device connected to the Internet

34
New cards

Domain Name

A text-based name that corresponds to the IP address

35
New cards

DNS Server

Translates the domain name into its associated IP address

36
New cards

Popular TLDs

.com

37
New cards

.edu

38
New cards

.gov

39
New cards

.mil

40
New cards

.net

41
New cards

.org

42
New cards

.com

commercial organizations, businesses, and companies

43
New cards

.edu

educational institutions

44
New cards

.mil

military organizations

45
New cards

.net

network providers or commercial companies

46
New cards

.org

nonprofit organizations

47
New cards

The World Wide Web

The collection of Web sites and the Internet is the wire and routers that connects us to the WWW

48
New cards

Website

A collection of related webpages and associated items

49
New cards

Web server

A computer that delivers requested webpages to your computer

50
New cards

Web 2.0

Refers to websites that provide a means for users to share personal information, allow users to modify website content, and provide applications through a browser

51
New cards

Browser

An application that enables users with an Internet connect to access and view webpages on a computer or mobile device

52
New cards

Home page

The first page that a website displays

53
New cards

http://

Hypertext Transfer Protocol

54
New cards

www.

host name

55
New cards

nps.gov

domain name example

56
New cards

/history

path

57
New cards

/places.htm

webpage name

58
New cards

Search engine

A software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic

59
New cards

Subject directory

Classifies webpages in an organized set of categories, such as sports or shopping, and related subcategories

60
New cards

a graphic

A digital representation of data and information, designed to communicate quickly, simplify complex concepts, or present patterns or trends

61
New cards

Email

The transmission of messages and files via a computer network

62
New cards

Email program

Allows you to create, send, receive, forward, store, print, and delete email messages

63
New cards

Email List

A group of email addresses used for mass distribution of a message

64
New cards

Instant messaging

Real-time Internet communications service

65
New cards

Discussion Forum

An online area in which users have written discussions about a particular subject

66
New cards

VoIP

voice over internet protocol

67
New cards

FTP (File Transfer Protocol)

An Internet standard that permits file uploading and downloading to an from other computers on the Internet. Many operating system include FTP capabilities. An FT server is a computer that allows users to upload and/or download files using FTP.

68
New cards

Netiquette

the code of acceptable internet behavior

69
New cards

Three Functions of ISP

Provides you with an internet address, serves as a gateway to the internet, pays for your access service

70
New cards

Three ways you connect to the internet

Digital subscriber line (DSL), Cable Modem, and Wi-Fi

71
New cards

5 levels of protocol from the client to the internet

Computer to wireless or Ethernet switch, switch to modem, modem to ISP internet protocol, over the internet transmission control protocol, internet application level protocol HTTP (HyperText Transport Protocol) or SMTP (Simple Mail Transfer Protocol) or FTP (File Transfer Protocol)

72
New cards

IP address

Identifies a particular device on the internet. IP addresses can be on the public internet or private intranet

73
New cards

Uniform Resources Locator (URL)

An address on the internet, consists of the protocol (HTTP://) followed by the domain name (Google.com)

74
New cards

VPN

Virtual private network creats the appearance of a private point to point connection

75
New cards

LAN

Local area network is a network consisting of a series of clients connected through a router wifi/ router to a server in clsoe proximity to the clients

76
New cards

WAN

Wide area networks, designed to support networking separated over miles apart. The internet is the connectors and routers and servers that connect you the World Wide Web

77
New cards

Conducting a Risk Assessment

Identify all known risks Identify impact Assessment likelihood of risk Determine mitigation plan

78
New cards

Vulnerabilities that put IS systems at risk

Electronic intrusions (Hacking, Viruses, Adware, Trojans)

79
New cards

Electronic theft of data (stolen passwords, unprotected system access)

80
New cards

Human Error (software vulnerabilities)

81
New cards

Employee theft (Fraud, embezzlement)

82
New cards

Hardware failures (failure to backup and protect data, system server loss)

83
New cards

Computer Crime (Pretexting, Phishing, Spoofing, Sniffing)

84
New cards

Programming Errors (faulty code that generates accounting errors)

85
New cards

Database Applications

Forms, Reports, Queries, Application programs database Management System (DBMS)Database

86
New cards

DBMS

• a program used to create, process, and administer a database.

87
New cards

• a licensed product.

88
New cards

• different from a database (a database is a collection of tables, relationships and the metadata (description of the data elements))

89
New cards

Examples of DBMS

DB2, IBM, Access, Microsoft, SQL Server, Oracle, MySQL, Open Source

90
New cards

Functions of DBMS

• Create tables, relationships and other structures (see metadata contents)

91
New cards

• Process the database (read, insert, modify or delete data)

92
New cards

• Uses SQL to perform these operations

93
New cards

• Administration of database

94
New cards

• Security

95
New cards

• Permission

96
New cards

• Backup/ Recovery

97
New cards

Functions Performed by the Application Programs

• Process the database

98
New cards

• Forms can be used for data entry

99
New cards

• Reports are produced from contents

100
New cards

• Queries are used to access