Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Chpt 5 Terminology

System Security

QuestionAnswer
The liaison between information technicians and business users who translate business requirements and problems into information technology requirements; often considered change agents within the organization. Systems analyst
Attacks where crackers flood a network or Web server with information requests in an attempt to crash the network. Denial of service
Information technology employee who monitors and maintains Web servers. Webmaster
The final systems test where users evaluate the entire system and indicate how well it meets the standards established at the beginning of the design or purchase of the system. Acceptance test
A dynamic process that requires interaction with personnel at all levels within the organization for analysis, design, development, implementation, and operation and maintenance of the organization’s computer-based information system. Systems life-cycle
Coded messages requiring the receiver to have an authorized decryption key to read the message; one-key, two-key, and a hybrid system. Encryption
Guidelines often posted on organization’s intranet for easy access and updates regarding the use/distribution/security of information for the entire organization; formation is typically responsibility of the CIO w/input from all organizational levels Information policy
Individuals proficient with productivity software and technology who are identified to provide assistance to other end users within the organization. Technology support group
Comprehensive audits on the computer-based information system to determine the effectiveness of all the security controls; includes external audits, internal audits, and data audits. Systems audit
A software program on the organization’s network, as well as desktop PCs, notebooks, and workstations, to detect and delete computer viruses. Antivirus program
An attachment to an electronic document that verifies the sender to be whom he/she claims. Digital certificate
An information system designed with duplicate hardware, software, and power supply so processing will continue during a system failure; important for mission critical operations. Fault-tolerate system
A destructive program that masquerades as a benign application; does not replicate. Trojan horse
A security control that identifies an individual based on physiological or behavioral characteristics; (i.e., iris, fingerprints, signature, and keystrokes). Biometric control
An information technology position typically staffed by an electrical engineer with a specialization in networks who can address the information technology infrastructure-hardware, software, data storage, and networks. Network engineer
The process of changing from the old system to a new one; methods include direct, parallel, phased and pilot. Conversion
A rogue software program that spreads throughout the network disrupting processing and memory operations and possibly destroying data; thousands exist, and approximately 50 new ones are created each month. Virus
A malicious hacker with the intent of disabling the computer system for a profit. Cracker
Technical specialists who write and maintain software instructions (code) for the computer; specialize in system software. Programmer
System that consists of software and hardware placed between the organization’s internal network(s) and an external, unsecured network to ensure that only authorized personal have access to the organization’s private network. Firewall
A digital code attached to a document to identify the sender and message contents; to be legally binding, someone must verify tat it belongs to the person who sent the data and that the data were not altered. Digital signature
One who possesses the technical and aesthetic skills for developing Web sites. Web designer
Standards for providing a secure information technology environment. Security protocol
Intentionally or unintentionally entering incorrect or fabricated data or changing or deleting existing data stored in the organization’s files and databases; typically done by organization insiders. Data tampering
A person who gains unauthorized access to a computer network for mischief. Hacker
The information technology person responsible for the logical database design, development of the data dictionary, security of the data, and monitoring how other use data. Database administrator
Unsolicited junk e-mail that interferes with work and can slow down the network to the point where efficient business communication and operations are affected by consuming valuable network bandwidth. Spam
A support station staffed by an information technology specialist where end users can call, e-mail, or drop in to receive both hard Help desk
Software that stores credit card and owner identification to be used for e-commerce purchases. Digital wallet
A committee that focuses on policies for the use of the information system, priorities for system development, budgets for information technology, system security, system maintenance, and system issues. Steering committee
An external location that contains a fully configured backup data center; includes all required hardware and software for a computer-based information system. Hot site
Unit staffed with technology specialists responsible for supporting end users in using hardware and software, maintaining hardware and software, providing technology workshops and seminars, and recommending new purchases for the user’s area of specialty. Information Center
Created by: imaitrt
Popular CPS/CAP sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards