Digital Systems final key terms

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

30 Terms

1
New cards

Consensus Mechanism

ensures all users that any block that is added to the chain is legitimate, without having to place their trust in an outside entity, such as a bank or governing body.

2
New cards

Proof of stake

if you’d like to add a block, you need to put your coins up as collateral. The disadvantage is that this system requires wealthy investors to create a strong initial stake.

3
New cards

Solana

Store of value (alternative currency), and also to create smart contracts and decentralized applications (dApps)

4
New cards

The universalist principle

a manager must attempt to determine if this decision is fair for all involved.

5
New cards

The utilitarian principle

when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved.

6
New cards

Intellectual property consists of four categories

Patents, Trademarks, Copyrights, and Trade secrets

7
New cards

Cognitive computing

the use of computer models that are designed to simulate human thought processes.

8
New cards

unsupervised learning

machine learning algorithms are used to examine and cluster unlabeled data sets.

9
New cards

Clustering -used in data mining that groups unlabeled data based on parallels and variances within the data set.

10
New cards

Neural Networks

use interconnected notes or neurons in a layered structure that resembles the brain

11
New cards

Generative adversarial networks (GANs)

a type of machine learning model that uses two neural networks that compete against each other.

12
New cards

generative network

Part of a GAN, used to create new synthetic instances of data that are erroneously identified as real data.

13
New cards

discriminative network

Part of a GAN, tests and identifies which data it receives has been synthetically created.

14
New cards

Deep Learning

uses neural networks, solves complex problems (ex. Reviewing MRI scans)

15
New cards

What causes data to be biased

Cognitive bias (conscious or unconscious data) or Incomplete data

16
New cards

Trojan horse

appears legitimate, but executes unwanted activity when activated. Similar to viruses but don’t replicate themselves and are often found in free downloads

17
New cards

Integrity

covers the methods used for confirming data are authentic. Tools include: data backup, CheckSums, data correction codes and availability of information

18
New cards

Availability

Maintains data and system accessibility through hardware upkeep, prompt repairs, a stable computing environment, upgrades, and sufficient communication bandwidth

19
New cards

Planning Stage

assesses current security measures & threat analysis

20
New cards

Protect stage

implement safeguards

21
New cards

Respond stage

contain the damage that results from a cybersecurity incident. (ensuring correct procedures are in place, communication with shareholders is immediate, analyzing the incident, etc.)

22
New cards

Computer Fraud and Abuse Act (CFAA)

prohibits unauthorized access to a computer, especially one used in commerce, intentionally damaging a computer, and transmitting threats of extortion.

23
New cards

Electronic Communications Protection Act (ECPA)

Protects communications in storage and transit.

24
New cards

Stored Communications Act (Title II of the ECPA)

makes intentional unauthorized access of electronic communication systems (such as email) illegal.

25
New cards

National Institute of Standards Technology (NIST) Cybersecurity Framework

designed to assist organizations in the development of cybersecurity policies and procedures to protect against cyber threats and intrusions.

26
New cards

Identify (ID) function

meant to encourage organizations to develop a better understanding of how to manage cybersecurity risks that comprise their IT infrastructure

27
New cards

Protect (PR) framework function

It is a construct for cybersecurity analysts and teams to develop and implement appropriate safeguards to ensure delivery of critical infrastructure services.

28
New cards

Detect (DE) framework function

detecting the type of suspicious activity that could lead to an infection or attack and identifying a threat or breach in a timely manner

29
New cards

Respond (RS) framework function

establishes the necessary procedures that enable stakeholders to take action regarding a detected cybersecurity event.

30
New cards

Recover (RC) framework function

An organization’s ability to develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.