click below
click below
Normal Size Small Size show me how
MISY160
Business Concepts & Tools ch 6-8
| Term | Definition |
|---|---|
| Information security | the protection of information systems and the information they manage against unauthorized access, use, manipulation, or destruction, and against the denial of service to authorized uses |
| Machine-level Security | actions taken to protect information on a computer not connected to the internet |
| Authentication | security process that verifies the identity of a person |
| Encryption | security technique that uses high-level mathematical functions and algorithms to encode data so it is unintelligible to all but the intend recipients |
| Data backup | copies of important files are stored in a safe place to guard against data loss |
| Network Security | concerned with addressing vulnerabilities and threats in computer networks |
| permissions | specific access privileges afforded to each network user and each system resources |
| Interior threats | network security threats that originate from within a network, typically from registerd users |
| Information theft | access of information by an unauthorized person for financial gain or benefit |
| Network Use Policy | document, agreement, or contract that defines acceptable and unacceptable use of computer and network resources |
| Internet Security | unique threats and defenses associated with computers connected to the internet -https |
| Hacker | anyone trying to get computer security without authorization |
| Firewall | hardware or software that protects the computer from getting information you did not request |
| Software Patch | fixes bugs and flaws in software through software update |
| Malware | -short for "malicious software" -any software designed to damage, corrupt, or illegally manipulate computer resources -includes: viruses, worms, and spyware |
| Antivirus Software | software that uses techniques to find viruses, worms, and spyware on a computer system, remove them if possible , and keep them off |
| Botnet | collection of computers working towards some goal |
| Identity Theft | the criminal act of stealing information about a person to assume that person's identity in order to commit fraud or other crime |
| Phishing Scam | combines both fraudulent e-mail and web sites in order to trick a person into providing private information for identity theft |
| Digital Media | digital technologies of all kind that serve and support publishing |
| eBooks | books in digital format |
| Digital Audio | type of sound, including voice, music, and sound effects, recorded and stored as a series of 1s and 0s |
| Sampling | process of capturing the value of sound wave at regular intervals to store sound and music digitally |
| Podcast | an audio file that contains a recorded broadcast distributed over Internet |
| Digital Graphic | any application to support creating, editing, and viewing 2D and 3D images and animations |
| RGB Color | method of specifying color digital using value for the intensity levels of red, green, and blue (RGB) as combined to create all colors |
| Vector Graphic Software | tools to create, arrange, and layer graphical objects on the screen |
| Graphic File Formats | designed to store various types of graphic images for varying purposes |
| Visualization | creating diagrams or images to convey a message |
| Animation | displaying digital images in rapid succession to create the illusion of motion |
| Digital Photography | photography that captures, stores, and manipulates photographs digitally as a series of 1s and 0s |
| Digital Cameras | camera that captures photographs, and sometimes video, and stores them digitally rather then on film |
| Database | a collection of data organized to meet user's needs |
| Database Structure | manner in which data is organized and stored |
| Data Management System | a group of programs that manipulates the data within a database |
| Data Hierachy | manner in which data in a data base is organized into sequential levels of detail |
| Database Key | is a field in a table used to identify a record -ex: Employee Number, Student ID, Social Security Number |
| Record | a collection of fields about a specific entity |
| Key | a field in a record that is used to identify the record |
| Primary key | a field within a database that uniquely identifies the record |
| Relation Database | organizes data into multiple tables that are related by common fields -one to many relationship |
| Database Tools | software and techniques for analyzing, maintaining, and manipulating data in a database |
| Schema | database schema is a graphical representation of the structure of a database -primary key match with relative key |
| Database Dictionary | provides a detail description of each field and table in a database |
| Structural Query Language (SQL) | popular data manipulation language used by the vast majority of database programmers and administrators for manipulating data to meet the need of the user |
| Industrial Database | large database that functions as the cornerstone of information systems in businesses and enterprises |
| Data Warehouse | very large database that holds important information of various sources |
| Data Mining | extracting data information from a data warehouse or data mart |
| Distributed Database | takes available data stored in multiple locations and makes it appear in a single location |
| Data Center | a climate-controlled building or set of buildings that house servers that store and deliver mission-critical information and services |
| Data Administrator (DBA) | a skilled and trained computer professional who directs all activities related to an organization's database |