1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
An acceptable use policy is a written statement that documents the best practices, rules, and limitations that a user must agree to when accessing a organization's network
what are AUPs, and why are they established?
Allows another device to control or view any computer on a network
what does remote desktop software allow the administrator to do?
Key components: subject line (most important), salutation, body, close
re key components of an email message: which line is the most important factor in ensuring that your message is read?
IDS (Intrusion Detection System)
strives to protect networks from hackers attempting to gain access
attack halting
stops the attack
attack blocking
closes the point through which the hacker attempted to gain access
data theft
Occurs when someone steals information from a company's network
wire-wire scam
Essential email frauds that often target small businesses
IS security manager
ensures the security of an organization's Information Systems, specifically its network
IS data analyst
use data to gain information; collects data for entry into a database interprets the information provided by the database and creates reports for senior management
IS database administrator
keeps an organization's information accessible by monitoring database performance
TPS: transaction processing systems
collect, store, track and retrieve sales and inventory data for an organization
DSS: decision support systems
provide a mid-level and upper-level managers with tools to assist them in managing their businesses and organizations
ERP:enterprise resource planning:
refers to business management software that encompasses nearly all business activities in a corporation
VPN- Virtual Private Network
a service that secures internet connections and provides added security when online. Create secure tunnels upon which data travels
automated
with deep learning, portions of the learning process are ___________, eliminating some of the need for human intervention
repurposing
the use of data outside the scope of the original purpose of the data
spillover
the use of data from individuals who were not the original targets of the data collection
data security
includes taking proper security measures to protect all types of data