bmis terms part 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

client side

runs in browser

2
New cards

server side

Runs on server.

3
New cards

Relative

based on current location

4
New cards

absolute

full path or URL.

5
New cards

TCO(total cost ownership)

Total direct and indirect costs.

6
New cards

Pros of cloud services

Scalability, cost-effective

7
New cards

ER Diagrams

Visual representation of database entities and relationships.

8
New cards

Primary Keys

Unique identifiers for table entries.

9
New cards

SQL

Language for database management and queries.

10
New cards

Poka Yoke

Design processes to prevent mistakes.

11
New cards

Sources of Data

Databases and logs.

12
New cards

Neural Networks/Machine Learning

AI systems that learn from data.

13
New cards

Push publishing

sent to user automatically

14
New cards

Pull publishing

user requests info.

15
New cards

Big data

Extremely large data sets analyzed for trends.

16
New cards

risk vs cost curve

Balance between security investment and risk.

17
New cards

CIA Triad

Confidentiality, Integrity, Availability.

18
New cards

Ways to Respond to Risk

Avoid, Accept, Transfer, Mitigate.

19
New cards

4 A’s of Risk

Authentication, Authorization, Accounting, Auditing.

20
New cards

Replication

live copy

21
New cards

Backups

saved data snapshots.

22
New cards

Synchronous replication

instant write to all nodes

23
New cards

asynchronous treplication

delay in replication.

24
New cards

RTO( recovery time objective)

Maximum allowable downtime.

25
New cards

RPO (Recovery Point Objective)

Maximum acceptable data loss (in time).

26
New cards

DDoS:

Multiple computers overwhelming a server.

27
New cards

SQL Injection

It's a security vulnerability that allows unauthorized access to or manipulation of data by entering harmful input.

28
New cards

Brute Force

Trying many username/password combinations.

29
New cards

Man-in-the-Middle

Fake site intercepting user data.

30
New cards

social Engineering:

Tricking people to gain access.

31
New cards

Private/Public Key Encryption

Encrypt with public key, decrypt with private key.

32
New cards

PCI Compliance

Secure handling of credit card information.

33
New cards

Risk Maps

Visual tools plotting risks by likelihood and impact.

34
New cards

Infrastructure/Operations

Backend support like servers and networking.

35
New cards

Development

Programmers building software.

36
New cards

Business

Process improvement, project management.

37
New cards

Security

Cybersecurity and auditing.

38
New cards

Support

Help desk and technical support services.

39
New cards

ITIL

Framework for IT service management, not strict rules.

40
New cards

service catalog

Menu listing available IT services.

41
New cards

KMS (Knowledge Management System)

Documented solutions for tech issues.

42
New cards

SOP (Standard Operating Procedure)

Step-by-step process instructions.

43
New cards

CAB (Change Advisory Board)

Reviews/approves IT changes.

44
New cards

RACI Charts

Define who is Responsible, Accountable, Consulted, and Informed.

45
New cards

CMDB (Configuration Management Database)

Database of IT assets and configurations.

46
New cards

Incident Request

problem to fix

47
New cards

Service request

something user asks for.

48
New cards

Problem Management

Finding and solving recurring IT issues.

49
New cards

IaaS (Infrastructure as a Service)

Renting basic IT resources like servers, storage, and networking.

50
New cards

PaaS (Platform as a Service)

Renting a platform where you can build and run your apps without managing servers.

51
New cards

SaaS (Software as a Service)

renting ready-to-use software over the internet.

52
New cards

SLA (Service Level Agreement)

A contract between a service provider and a customer that defines expected service levels (like uptime, response time).

53
New cards

OLA (Operational Level Agreement)

An internal agreement between parts of a company that support the SLA.

54
New cards

Page/Swap Files

Used when RAM fills up — moves data temporarily to hard disk.

55
New cards

CapEx (Capital Expenditure)

Big, upfront purchases for assets you own long-term.

56
New cards

OpEx (Operating Expenditure)

Ongoing expenses you pay as you go.