click below
click below
Normal Size Small Size show me how
MISY160
Business Concepts & Tools ch 6-8
Term | Definition |
---|---|
Information security | the protection of information systems and the information they manage against unauthorized access, use, manipulation, or destruction, and against the denial of service to authorized uses |
Machine-level Security | actions taken to protect information on a computer not connected to the internet |
Authentication | security process that verifies the identity of a person |
Encryption | security technique that uses high-level mathematical functions and algorithms to encode data so it is unintelligible to all but the intend recipients |
Data backup | copies of important files are stored in a safe place to guard against data loss |
Network Security | concerned with addressing vulnerabilities and threats in computer networks |
permissions | specific access privileges afforded to each network user and each system resources |
Interior threats | network security threats that originate from within a network, typically from registerd users |
Information theft | access of information by an unauthorized person for financial gain or benefit |
Network Use Policy | document, agreement, or contract that defines acceptable and unacceptable use of computer and network resources |
Internet Security | unique threats and defenses associated with computers connected to the internet -https |
Hacker | anyone trying to get computer security without authorization |
Firewall | hardware or software that protects the computer from getting information you did not request |
Software Patch | fixes bugs and flaws in software through software update |
Malware | -short for "malicious software" -any software designed to damage, corrupt, or illegally manipulate computer resources -includes: viruses, worms, and spyware |
Antivirus Software | software that uses techniques to find viruses, worms, and spyware on a computer system, remove them if possible , and keep them off |
Botnet | collection of computers working towards some goal |
Identity Theft | the criminal act of stealing information about a person to assume that person's identity in order to commit fraud or other crime |
Phishing Scam | combines both fraudulent e-mail and web sites in order to trick a person into providing private information for identity theft |
Digital Media | digital technologies of all kind that serve and support publishing |
eBooks | books in digital format |
Digital Audio | type of sound, including voice, music, and sound effects, recorded and stored as a series of 1s and 0s |
Sampling | process of capturing the value of sound wave at regular intervals to store sound and music digitally |
Podcast | an audio file that contains a recorded broadcast distributed over Internet |
Digital Graphic | any application to support creating, editing, and viewing 2D and 3D images and animations |
RGB Color | method of specifying color digital using value for the intensity levels of red, green, and blue (RGB) as combined to create all colors |
Vector Graphic Software | tools to create, arrange, and layer graphical objects on the screen |
Graphic File Formats | designed to store various types of graphic images for varying purposes |
Visualization | creating diagrams or images to convey a message |
Animation | displaying digital images in rapid succession to create the illusion of motion |
Digital Photography | photography that captures, stores, and manipulates photographs digitally as a series of 1s and 0s |
Digital Cameras | camera that captures photographs, and sometimes video, and stores them digitally rather then on film |
Database | a collection of data organized to meet user's needs |
Database Structure | manner in which data is organized and stored |
Data Management System | a group of programs that manipulates the data within a database |
Data Hierachy | manner in which data in a data base is organized into sequential levels of detail |
Database Key | is a field in a table used to identify a record -ex: Employee Number, Student ID, Social Security Number |
Record | a collection of fields about a specific entity |
Key | a field in a record that is used to identify the record |
Primary key | a field within a database that uniquely identifies the record |
Relation Database | organizes data into multiple tables that are related by common fields -one to many relationship |
Database Tools | software and techniques for analyzing, maintaining, and manipulating data in a database |
Schema | database schema is a graphical representation of the structure of a database -primary key match with relative key |
Database Dictionary | provides a detail description of each field and table in a database |
Structural Query Language (SQL) | popular data manipulation language used by the vast majority of database programmers and administrators for manipulating data to meet the need of the user |
Industrial Database | large database that functions as the cornerstone of information systems in businesses and enterprises |
Data Warehouse | very large database that holds important information of various sources |
Data Mining | extracting data information from a data warehouse or data mart |
Distributed Database | takes available data stored in multiple locations and makes it appear in a single location |
Data Center | a climate-controlled building or set of buildings that house servers that store and deliver mission-critical information and services |
Data Administrator (DBA) | a skilled and trained computer professional who directs all activities related to an organization's database |