1/155
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What is telecommunications?
electronic transmission of audio, sound and information through a distance by electromagnetic waves
Convergence
connecting telephone and computer into one
Broadband
contain more data and sends it faster
Major Computer Network Components
client/server, network interfaces, connection medium, hubs/switches
client/server computing
Form of distributed processing in which some machines (servers) perform computing functions for end-user PCs (clients).
Packet Switching
slicing digital networks into packets and sending them through connected networks
Protocol
rules that govern transmission of info between on point to another
TCP/IP
Transmission Control Protocol/Internet Protocol
Modem
a conversion device for digital and analog data
Digital Signal
A system of discrete states: high or low, on or off, 1 or 0.
Analogy signals
continuously changing signals
Bandwidth
difference between the highest and lowest frequencies in a band or set of frequencies
What is the internet?
A worldwide network of interconnected networks
Network Service Providers
Own trunk lines (high-speed backbone networks)
Regional telephone and cable TV companies
Provide regional and local access
Government Bodies duties
makes internet standards
DNS (Domain Name System)
Converts IP address into domains, or identifying labels that use a variety of recognizable naming conventions.
IP address
A number assigned to any item that is connected to the Internet.
Web Server
a computer that delivers requested webpages to your computer or mobile device
Searching for info on the web
search engines, search engine marketing and search engine optimization
What is search engine optimization?
the process of maximizing the number of visitors to a particular website by ensuring that the site appears high on the list of results returned by a search engine.
wireless sensor networks (WSNs)
networks of interconnected wireless devices with built-in processing, storage, and radio-frequency sensors and antennas that are embedded into the physical environment to provide measurements of many points over large spaces
Radio Frequency Identification (RFID)
uses electronic tags and labels to identify objects wirelessly over short distances
What is e-commerce?
Conducting business on the internet (buying/selling on the internet)
Technology foundations for eCommerce
wifi connection, wearable devices, smartphones
ubiquity
Internet/Web technology available everywhere: work, home, and so on, anytime
Global reach
the ability to reach anyone connected to the internet anywhere in the world
universal standards
One set of technology standards: Internet standards
Richness
Supports video, audio, and text messages
Interactivity
can interact w/ customers (tech support chat window)
information density
the total amount and quality of information available to all market participants
information asymmetry
situation in which one party is more informed than another because of the possession of private information
menu costs
the costs of changing prices
search costs
the effort required to find suitable products
transaction costs
the expenses of negotiating and executing a deal
dynamic pricing
adjusting prices continually to meet the characteristics and needs of individual customers and situations
Disintermediation
occurs when a business sells directly to the customer online and cuts out the intermediary
Digital Goods
goods that can be delivered over a digital network
Business-to-business (B2B)
applies to businesses buying from and selling to each other over the internet
Business-to-consumer (B2C)
applies to any business that sells its products or services to consumers over the internet
Consumer-to-consumer (C2C)
applies to customers offering goods and services to each other on the internet
long tail marketing
ability of firms to market goods profitably to very small online audiences, largely because of the lower costs of reaching very small market segments
behavorial targeting
the process of following people's behavior and then sending them material tailored to what was learned about them
native targeting
provides new ways to communicate with customers
social shopping sites
Swap shopping ideas with friends (Ex. Pinterest)
Social network marketing
using online social networks to build and strengthen brands
Electronic Data Interchange (EDI)
the computer-to-computer exchange of business documents from a retailer to a vendor and back
M-commerce
the ability to conduct commerce using a mobile device for the purpose of buying or selling goods or services
mission-critical
Systems that must run without failure or with nearly instant recovery from failure or will result in major loss
Why are information systems vulnerable?
have confidential info, trade secrets, info on new products
Software problems
Programming errors, installation errors, unauthorized changes, physical damage
Buffer Overflow
A technique for crashing by sending too much data to the buffer in a computer's memory leaving user with heightened privilege
Computer Crime
any illegal act involving a computer
Computer as target of crime
Breaching confidentiality of protected computerized data
Accessing a computer system without authority
Computer as an Instrument of Crime
theft of trade secrets,
using emails for threats
SSID
The name of a wireless network
War driving
driving around looking for unprotected home or corporate wireless networks and gain access
virus
A piece of code that is capable of and typically has a detrimental effect, such as corrupting the system or destroying data needs a host
Worm
A destructive computer program that bores its way through a computer's files or through a computer's network no active host needed
Trojan Horse
a program that appears desirable but actually contains something harmful
Hackers
People who try to get access to your computer without your permission
Cracker
a hacker with criminal intent
SQL Injection
An attack that targets SQL servers by injecting commands to be manipulated by the database.
Phising
Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data
Pharming
Reroutes requests for legitimate websites to false websites
Back door
a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
spoofing
pretending to be someone or something else, normally without permission
sniffing
Eavesdropping on network communications by a third party.
denial of service attack
a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources
Botnets
a set of computers that are penetrated by malicious software known as malware that allows an external agent to control their actions
Social Engineering
hackers use their social skills to trick people into revealing access credentials or other valuable information
general controls
controls designed to make sure an organization's information system and control environment is stable and well managed
application controls
Controls that apply to the processing of specific computer applications and are part of the computer programs used in the accounting system.
CAPTCHA
prevents software bots
reCAPTCHA
prevents digital books from bots
WEP (Wired Equivalent Privacy)
A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
WPA2 (Wi-Fi Protected Access 2)
A secure encryption protocol.
risk assessment
the process of measuring risk
security policy
Ranks information risks, identifies acceptable security goals, and identifies mechanisms for achieving these goals
disaster recovery plan
A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood
Business Continuity Planning
outlines procedures for keeping an organization operational in the event of a natural disaster or network attack
information systems audit
examines the firm's overall security environment as well as controls governing individual information systems
security audit
An assessment of an organization's security vulnerabilities performed by an accredited network security firm.
Hardware Platform Trends
mobile digital platform, virtualization, green computing, quantum computing, BYOD
BYOD
Bring Your Own Device
Virtualized Computing
Creates multiple "virtual" machines on a single computing device
Cloud Computing
the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
green computing
involves reducing the environmental waste generated when using a computer
Quantum computing
uses the principles of quantum physics to represent data and perform operations on these data
open source software
Software such as Linux that includes its uncompiled source code which can be modified and distributed by programmers
Java
a programming language used to create interactivity on web pages
Python
used to build cloud computing app
HTML
The file format for documents viewed using a browser.
Service-oriented architecture (SOA)
set of self-contained services that communicate with each other to create a working software application
Web Services
Software components that exchange information with one another using universal Web communication standards and languages
XML (Extensible Markup Language)
programming language that uses author-defined tags to identify each data entry so that the data can be easily imported into other applications
3 external sources for software
(1) Software packages and enterprise software
(2) Software outsourcing