CISB FINAL EXAM REVIEW: Modules 12-14

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/79

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

80 Terms

1
New cards

Database

a collection of related data that is stored and organized in a manner enabling information to be retrieved from the DB as needed.

2
New cards

Entity

a person, place, or thing (for example, customer, order, product) an
organization wants to store data about

3
New cards

Advantages of Databases

-Reduced Data Redundancy

-Improved data integrity

-Shared Data

-Easier Access

-Reduced Development Time

4
New cards

Database Administrator (DBA)

The person responsible for managing an organization’s
database. Responsibilities include assigning and updating user access, creating and/or modifying table data, monitoring DB performance, creating database backups and data security.

5
New cards

Database Management System (DBMS)

Program that allows users to create a database and
then add, delete, modify, and query data within the database

6
New cards

Popular DBMS

Access, MySQL, Oracle, SQL Server

7
New cards

Front-end

User-friendly interface that enables users to enter, change and retrieve data from the back-end database. In a web app the front-end is created using HTML, CSS and JavaScript (or other scripting language)

8
New cards

Back-end

includes the server containing the DBMS and the data itself. For data integrity and security reasons, only database designers and DBAs interact directly with the DBMS.

9
New cards

Table

A collection of fields, organized into rows and columns. and looks like an Excel spreadsheet.

10
New cards

Query

extracts data from a database based on specified criteria, or conditions, for one or more fields located in one or more tables.

11
New cards

Report

way of retrieving and displaying data from the tables in a customized format. Can contain images and provide much of the same formatting capabilities as word processing program.

12
New cards

Form

provides an easy-to-use data entry screen that hides all the other records in a table so the user only sees the fields of one record at a tim

13
New cards

Data Dictionary

keeps track of the “definitions” (such as field properties) of all the table structures within a DB. A data dictionary improves the data integrity of a database because it does not allow a user to enter invalid data into the database tables called data validation.

14
New cards

Data Definition

describes the properties of the data that go into each DB table

15
New cards

Data Validation

making sure you can put valid data into the database tables

16
New cards

Primary Key

unique identifier for a record in a database table. It ensures that each row has a distinct value, preventing duplicates and null value.

17
New cards

Foreign Key

Any field in one table that is a primary key in another table

18
New cards

SQL

standard language used by all relational DBMS to add,
delete, modify, and query information from a database. SQL has industry standard commands:
• The Insert command is used to add data to a table
• The Delete command is used to delete a record from the table
• The Update command is used to modify data in a table
• The Select command is used to query data from one or more tables

19
New cards

Middleware

software that acts as a bridge between the database and applications, enabling communication, data processing, and management functions like authentication, transaction handling, and API interactions.

20
New cards

Big data

Refers to diverse data (tweets, facebook posts, websites, pictures, videos, phone records, etc.) that is not structured in a way that enables it to be stored in a traditional database.

21
New cards

Alphabetic/Numeric Check

ensures that users enter only alphabetic data into a field. A ___ ensures that users enter only numeric data into a field.

22
New cards

Range Check

determines whether a number is within a specified range.

23
New cards

Consistency Check

tests the data in two or more associated fields to ensure that the relationship is logical and their data is in the correct format.

24
New cards

Completeness Check

verifies that a required field contains data.

25
New cards

Check Digit

is a number(s) or character(s) that is appended to or inserted in a primary key value.

s a number added at the end of an ID or code to help catch mistakes when entering data into a database.

26
New cards

Database Security Strategies

  • Require strong passwords and minimal access privileges for database users.

  • Store database servers in secure, locked rooms.

  • Filter all access requests through a firewall to block hackers.

  • Encrypt sensitive data to prevent unauthorized access.

  • Automate daily backups to ensure data security.

  • Maintain a tested recovery plan for emergencies.

27
New cards

Digital Security Risk

any event or action that could cause a loss of or damage to computer hardware, software, data and/or processing capability

28
New cards

Computer Crime

is any illegal act involving the use of a computer

29
New cards

Hacker

are people who access a computer or network illegally

30
New cards

Zombie

a computer that is being controlled remotely by a hacker without the knowledge of the computer's owner.

31
New cards

botnet

is a group of zombies that are used to attack other networks.

32
New cards

backdoor

software that allows a user to bypass security controls when accessing a computer. When hackers gain access to a computer they often install, which allows them to continue to access the computer remotely without the user's knowledge

33
New cards

Spoofing

when a hacker tries to make an email or website look legitimate in order to trick
the user into downloading malware or providing confidential information

34
New cards

Malware

are programs created by hackers that harm the computer's
operations.

35
New cards

Virus

software that is attached to a data file, program file, or email message. Can delete files, erase the hard drive, slow system performance, display screen messages, and/or send emails to everyone in your address book

36
New cards

Trojan Horse

malicious program that is disguised as (or within) a legitimate program. When the program is run, it executes whatever malicious code the hacker has written. Cannot duplicate itself

37
New cards

Denial of Service Attack

Program that floods a web server or network server with so many
requests for action that it or can no longer handle legitimate requests

38
New cards

Spyware

A program that is installed on a computer without the user’s knowledge. Secretly gathers information about the user (Web site activity and/or keystrokes) and transmits it back to the person who created it

39
New cards

Ransomware

A program that encrypts the victim’s data so it is not accessible. The hacker demands the victim to pay a ransom (in untraceable bitcoins) in order to have their data restored

40
New cards

Encryption

codes data into a form that is unreadable to an unauthorized party

41
New cards

VPN

enables mobile users to have a secure connection to
an organization's network. It uses software installed on both the company server and the user's computer to encrypt data sent remotely over the Internet

42
New cards

digital signature

an encrypted code that a person, website or organization attaches to an electronic message to verify the identity of the message sender

43
New cards

disaster recovery plan

lists the actions an organization should take if a natural or
mad-made disaster occurs to their computer system

44
New cards

ethics

are the moral guidelines that govern the use of computers, mobile devices and information systems.

45
New cards

computer code of conduct

users of their computers are required to
follow. Written guidelines that define what actions are allowed and not allowed when using an organization's computers and network

46
New cards

green computing

means considering the environment by reducing electricity and environmental waste.

47
New cards

cookie

a small text file that is created and stored in a cookie folder on your hard drive by a Web server to identify return visitors and their preferences.

48
New cards

adware

a program that displays unwanted, online advertisements in a banner, pop-up window or other location on the computer screen.

49
New cards

Five Strategies to protect from a Malware Attack

  • Use antivirus software to scan emails, messages, and downloads for malware.

  • Enable a firewall to block suspicious incoming data and prevent cyberattacks.

  • Download software and files only from trusted websites.

  • Avoid sharing external storage devices between computers to prevent infections.

  • Only open email attachments from known senders; avoid files with risky extensions like .exe, .com, .bat, or .vbs.

  • Keep software up to date by regularly installing security patches for your operating system, browser, email, and antivirus programs.

  • Avoid peer-to-peer site downloads to reduce exposure to malware.

  • Back up your data regularly to protect against loss.

50
New cards

Unauthorized Access

occurs when a person gains access to a computer or network without permission.

51
New cards

Unauthorized Use

involves using a computer resource for unauthorized (and possibly illegal) activities

52
New cards

Five strategies to protect a device from unauthorized access and unauthorized use

  • Require employees to log in with usernames and passwords, granting access only to necessary files and programs.

  • Enforce strong passwords (at least 8 characters with symbols, numbers, and letters) and require frequent password changes. Remove access when an employee leaves.

  • Set clear rules for computer use with an acceptable use policy (AUP).

  • Disable file and print sharing to prevent unauthorized access.

  • Use firewalls to block hackers and scan incoming messages for threats.

  • Require users to enter CAPTCHA codes to prevent automated logins.

  • Implement access control with magnetic cards, badges, or biometric devices (fingerprint, eye, or voice recognition).

  • Use two-step verification (e.g., password + a texted code) for extra security

53
New cards

Five strategies to protect against information theft.

  • Encrypt sensitive data to keep it secure from unauthorized access.

  • Use a VPN for secure remote connections.

  • Digital signatures verify message authenticity.

  • Digital certificates confirm website legitimacy.

  • HTTPS encryption protects online data exchange.

  • Trust cloud providers like Microsoft & Amazon for security.

54
New cards

Three strategies to protect against hardware theft and vandalism

  • Secure hardware like servers, routers, and switches in locked, unmarked rooms with magnetic badge access.

  • Use surveillance cameras and alarms to detect unauthorized entry or temperature issues.

  • Physically lock computers and equipment to prevent tampering or theft.

  • Install device tracking software on mobile computers for location monitoring and recovery.

55
New cards

Five strategies to protect against hardware failure

  • Protect hardware with surge suppressors and UPS devices to prevent damage from electrical surges or power outages.

  • Back up all critical data on secure cloud storage and fireproof/offsite locations to prevent data loss.

  • Use redundant systems (multiple CPUs, hard drives, and NICs) to ensure continuous operation during failures.

  • Prevent overheating and physical damage by avoiding extreme temperatures, soft surfaces, and liquid exposure near computers.

  • Develop a disaster recovery plan outlining evacuation procedures, backup locations, insurance details, and steps to restore operations after a disaster.

56
New cards

Five things that should be part of a disaster recovery plan

  1. Risk Assessment – Identify potential threats and their impact.

  2. Emergency Response – Outline immediate actions to protect people and assets.

  3. Data Backup & Recovery – Ensure secure backups and restoration procedures.

  4. Redundant Systems – Maintain backup infrastructure for seamless operations.

  5. Communication Plan – Establish clear protocols for notifying employees and stakeholders.

57
New cards

Five Wireless Security Strategies

  • Change default WAP passwords for security.

  • Keep WAPs locked away to prevent unauthorized access.

  • Disable SSID broadcast to hide the network.

  • Use WPA3 encryption to secure wireless data.

  • Restrict device access with MAC address filtering.

  • Limit signal range to reduce exposure if possible.

58
New cards

1st Step every web developer follows when creating a web site

Designing it’s layout

59
New cards

2nd Step every web developer follows when creating a web site

Deciding upon the content for each web page

60
New cards

3rd Step every web developer follows when creating a web site

Typing the HTML code into a text editor (or uses a web-authoring tool to do so)

61
New cards

4th Step every web developer follows when creating a web site

Publishing Site to Web Server

62
New cards

Web Flowchart

illustrates the design of the entire website by using geometric shapes to represent each web page and lines to indicate the links between web pages

63
New cards

Web Page Layout

illustrates the type, location and size of the content on each web page.

64
New cards

Text Editor

similar to a word processing program, but it lacks most text formatting features and it saves files in a text format

65
New cards

Code Editor

is a type of text editor that has additional features such as displaying different types of html code in different colors and adding indenting and line spacing to improve code readability.

66
New cards

Web-authoring Software

simplifies Web development by enabling individuals to create Web
pages without writing HTML code.

67
New cards

Content Management System

a web publishing tool that manages the publishing, modifications, organization, and access to web resource

68
New cards

HTML

the primary language used to create Web pages. uses tags to inform the browser where Web page content (headings, paragraphs, images) will appear and how it will appear.

69
New cards

Cascading Style Sheets (CSS)

often used within a web page to specify the fonts, colors, layout
and placement of HTML elements on a webpage.

70
New cards

Javascript

a scripting language that enables the web page to generate content and allows a user to interact with a web page.

71
New cards

Hyperlink

s text or a graphic within a web page that, when clicked, navigates to another web page or performs some other action

72
New cards

Types of Multimedia

Text, Graphics, Animation, Audio, Video

73
New cards

HTML Tag

are elements used to structure and format content on web pages. They are enclosed in angle brackets (< >) and usually come in pairs: an opening tag () and a closing tag

74
New cards

Title

<title>

75
New cards

Body

<body>

76
New cards

Heading

<h1> to <h6>

77
New cards

Paragraph

<p>

78
New cards

Image

<img>

79
New cards

List

<ul>

80
New cards

Common Guidelines for creating accessible pages

  • Use alt tags for images, videos, and audio to help visually impaired users.

  • Provide text transcripts for video/audio to assist hearing-impaired users.

  • Specify the site’s language in the header for better text reader support.

  • Use high-contrast colors and avoid confusing color combinations for color-blind users.