Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Chpt 5 Terminology

System Security

QuestionAnswer
The liaison between information technicians and business users who translate business requirements and problems into information technology requirements; often considered change agents within the organization. Systems analyst
Attacks where crackers flood a network or Web server with information requests in an attempt to crash the network. Denial of service
Information technology employee who monitors and maintains Web servers. Webmaster
The final systems test where users evaluate the entire system and indicate how well it meets the standards established at the beginning of the design or purchase of the system. Acceptance test
A dynamic process that requires interaction with personnel at all levels within the organization for analysis, design, development, implementation, and operation and maintenance of the organization’s computer-based information system. Systems life-cycle
Coded messages requiring the receiver to have an authorized decryption key to read the message; one-key, two-key, and a hybrid system. Encryption
Guidelines often posted on organization’s intranet for easy access and updates regarding the use/distribution/security of information for the entire organization; formation is typically responsibility of the CIO w/input from all organizational levels Information policy
Individuals proficient with productivity software and technology who are identified to provide assistance to other end users within the organization. Technology support group
Comprehensive audits on the computer-based information system to determine the effectiveness of all the security controls; includes external audits, internal audits, and data audits. Systems audit
A software program on the organization’s network, as well as desktop PCs, notebooks, and workstations, to detect and delete computer viruses. Antivirus program
An attachment to an electronic document that verifies the sender to be whom he/she claims. Digital certificate
An information system designed with duplicate hardware, software, and power supply so processing will continue during a system failure; important for mission critical operations. Fault-tolerate system
A destructive program that masquerades as a benign application; does not replicate. Trojan horse
A security control that identifies an individual based on physiological or behavioral characteristics; (i.e., iris, fingerprints, signature, and keystrokes). Biometric control
An information technology position typically staffed by an electrical engineer with a specialization in networks who can address the information technology infrastructure-hardware, software, data storage, and networks. Network engineer
The process of changing from the old system to a new one; methods include direct, parallel, phased and pilot. Conversion
A rogue software program that spreads throughout the network disrupting processing and memory operations and possibly destroying data; thousands exist, and approximately 50 new ones are created each month. Virus
A malicious hacker with the intent of disabling the computer system for a profit. Cracker
Technical specialists who write and maintain software instructions (code) for the computer; specialize in system software. Programmer
System that consists of software and hardware placed between the organization’s internal network(s) and an external, unsecured network to ensure that only authorized personal have access to the organization’s private network. Firewall
A digital code attached to a document to identify the sender and message contents; to be legally binding, someone must verify tat it belongs to the person who sent the data and that the data were not altered. Digital signature
One who possesses the technical and aesthetic skills for developing Web sites. Web designer
Standards for providing a secure information technology environment. Security protocol
Intentionally or unintentionally entering incorrect or fabricated data or changing or deleting existing data stored in the organization’s files and databases; typically done by organization insiders. Data tampering
A person who gains unauthorized access to a computer network for mischief. Hacker
The information technology person responsible for the logical database design, development of the data dictionary, security of the data, and monitoring how other use data. Database administrator
Unsolicited junk e-mail that interferes with work and can slow down the network to the point where efficient business communication and operations are affected by consuming valuable network bandwidth. Spam
A support station staffed by an information technology specialist where end users can call, e-mail, or drop in to receive both hard Help desk
Software that stores credit card and owner identification to be used for e-commerce purchases. Digital wallet
A committee that focuses on policies for the use of the information system, priorities for system development, budgets for information technology, system security, system maintenance, and system issues. Steering committee
An external location that contains a fully configured backup data center; includes all required hardware and software for a computer-based information system. Hot site
Unit staffed with technology specialists responsible for supporting end users in using hardware and software, maintaining hardware and software, providing technology workshops and seminars, and recommending new purchases for the user’s area of specialty. Information Center
Created by: imaitrt