1/43
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Data
Wide range of items from customer details, and financial records to internal comuncation.
Information
.Processed data that provides value and context.
Intellectual Property
Creations of the mind, such as inventions, literary and artistic works, designs, and symbols used in commerce.
Copyrights
Legal term used to describe the rights that creators have over their literary and artistic works.
Trademarks
Sign used to distinguish the goods or services of one enterprise from those of other enterprises
Patent
An exclusive right granted for an invention, which is a product or a process that provides a new way of doing something or offers a new technical solution to a problem.
Digital Product
Intangible assets that exist in the same kind of digital format
Digital Rights Management (DRM)
Systemic approach to copyright protection for digital products. Encrypts the content of a digital product and allowing access only to those who have the necessary decryption skills.
Security Controls
Safeguards or countermeasures employed to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.
Administrative Controls
Policies, procedures, and practices that estaboish the framework for an organizations security posture
Physical Controls
Involve the use of physical measures to protect assets and prevent unauthorized access
Techinical Controls
Implemented through technology solutions to protect information systems & data
Backups
Regular data backups are a crucial security control that ensures data can be recovered in the case of loss or corruption
Access Controls
Limit and prevent any access to data to make sure the datas value is well kept
Data Encryption
Converts data into code to prevent unauthorized access
Firewalls
Network security systems that monitor and control incoming and outgoing traffic based on predetermined security rules.
Data Exfiltration
Unauthorized transfer of data from a computer or server
High availability
Involves designing systems and processes to ensure a high level of operational performance for a longer period
Return on Security Investment (ROSI)
A metric used to calculate the effectiveness of investments of cybersecurity.
Product Fulfillment
Process to deliver a product to the customer after a sale
Data Capture and Collection
The process of gathering and storing data from various sources for analysis and decision-making.
Central Processing Unit (CPU)
Microprocesser that interpretds and carries out most of the instructions from the software & hardware of a computer
Random Access Memory (RAM)
Used to perform temporary storage functions in the computer and its used heavily by the CPU
Storage Devices
Hardware used to store data permanently or temporarily, such as hard drives, SSDs, and USB flash drives.
Motherboard
The main printed circuit board in a computer that connects the CPU, RAM, and other hardware components, facilitating communication between them.
Power Supply Unit (PSU)
It takes electrical power from an home or office wall outlet and converts it into a form that the computers components can use
Peripheral Devices
Hardware elements that we, as humans interact directly with, such as the monitor, keyboard, mouse, printer, and speakers
System Software
Responsible for managing and controlling the computer hardware
Application Software
Designed to help users complete some kind of productive task.
Fetch-Decode-Execute
A process in computer architecture where an instruction is fetched from memory, decoded to determine the action, and then executed by the CPU.
Workstations
High performance computers designed for technical or scientific applications
All in One Systems (AIO)
Offer a compact and intergrated solution tht combines the functionality of a desktop computer and a monitor into a single device
Operating Systems (OS)
Vital piece of a system software that manages and controls the computers hardware resources and offers services for other software to run to.
Desktops
Known for their expandability & customizations, they cater to everyday computing tasks
Laptops
Compact, all in one computing device designed to be portable and suitable for mobile use.
Servers
Powerful computer designed to manage, store, send and processes data 24/7
Redundant Array of Inexpensive Devices (RAID)
They combine multiple individual hard drives or solid state devices into a single logical device used by the server
Headless Configuration
No monitor, no keyboard, or mouse directly connected to the serverS
Smartphone
Handheld device that combines the the functionalities of a computer and a cellular phone
Tablets
Portable touchscreen devices that utilize the same kind of mobile operating systems like iOS
Internet of Things (IOT)
Devices embedded with sensors, software, and network connectivity enable seamless integration between the physical and digital world
Industrial Internet of Things (IIOT)
Sensors on manufacturing equipment can predict maintenence needs, helping to reduce downtime and improve efficiency.
GE’s Predix
Offers a suit of analytical tools that help companies make sense of data from industrial equipment, optimizing performance, and predicting potential equipment failures
Original Experience Manufacturer (OEM)
Those that produce parts, components, or subsystems that are used in another companys endproduct