Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
102 Cards in this Set
- Front
- Back
Firewall, helps protect pc from hackers who try delete info, crash pc or steal p-words or cc#s
|
Three basic types of firewalls are available for you to choose from:Software firewalls are a good choice for single computers, and they work well with Windows 98, Windows Me, and Windows 2000. (Windows Vista and Windows XP both have a built-in firewall, so an additional firewall is not necessary.)
2)Hardware routers are a good choice for home networks that will connect to the Internet 3)If you have or plan to use a wireless network, you need a wireless router |
|
Trojan horse
|
Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
|
|
Botnets
|
What they are:
A collection of software robots, or 'bots', that creates an army of infected computers (known as ‘zombies’) that are remotely controlled by the originator. Yours may be one of them and you may not even know it. What they can do: •Send spam emails with viruses attached. •Spread all types of malware. •Can use your computer as part of a denial of service attack against other systems. |
|
Malware is one of the more common ways to infiltrate or damage your computer.
|
What it is:
Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware. What it can do: •Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information. •Reformat the hard drive of your computer causing you to lose all your information. •Alter or delete files. •Steal sensitive information. •Send emails on your behalf. •Take control of your computer and all the software running on it. |
|
Pharming is a common type of online fraud
|
What it is:
A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website. What it can do: •Convince you that the site is real and legitimate by spoofing or looking almost identical to the actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent. |
|
Phishing is used most often by cyber criminals because it’s easy to execute and can produce the results they’re looking for with very little effort.
|
What it is:
Fake emails, text messages and websites created to look like they’re from authentic companies. They’re sent by criminals to steal personal and financial information from you. This is also known as “spoofing”. What it does: •Trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner than seems official and intimidating, to encourage you to take action. •Provides cyber criminals with your username and passwords so that they can access your accounts (your online bank account, shopping accounts, etc.) and steal your credit card numbers. |
|
SpamSpam is one of the more common methods of both sending information out and collecting it from unsuspecting people.
|
What it is:
•The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs. •Canada’s anti-spam legislation applies to all commercial electronic messages. A commercial electronic message is any electronic message that encourages participation in a commercial activity, regardless of whether there is an expectation of profit. What it can do: •Annoy you with unwanted junk mail. •Create a burden for communications service providers and businesses to filter electronic messages. •Phish for your information by tricking you into following links or entering details with too-good-to-be-true offers and promotions. •Provide a vehicle for malware, scams, fraud and threats to your privacy |
|
Spoofing:This technique is often used in conjunction with phishing in an attempt to steal your information.
|
What it is:
A website or email address that is created to look like it comes from a legitimate source. An email address may even include your own name, or the name of someone you know, making it difficult to discern whether or not the sender is real. What it does: •Spends spam using your email address, or a variation of your email address, to your contact list. •Recreates websites that closely resemble the authentic site. This could be a financial institution or other site that requires login or other personal information. |
|
Spyware and adware are often used by third parties to infiltrate your computer.
|
What it is:
Software that collects personal information about you without you knowing. They often come in the form of a ‘free’ download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer with viruses. What it can do: •Collect information about you without you knowing about it and give it to third parties. •Send your usernames, passwords, surfing habits, list of applications you’ve downloaded, settings, and even the version of your operating system to third parties. •Change the way your computer runs without your knowledge. •Take you to unwanted sites or inundate you with uncontrollable pop-up ads. |
|
Trojan horse
|
What it is:
A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it’s downloaded. What it can do: •Delete your files. •Use your computer to hack other computers. •Watch you through your web cam. •Log your keystrokes (such as a credit card number you entered in an online purchase). •Record usernames, passwords and other personal information. |
|
Viruses
|
What they are:
Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of a virus. What they can do: •Send spam. •Provide criminals with access to your computer and contact lists. •Scan and find personal information like passwords on your computer. •Hijack your web browser. •Disable your security settings. •Display unwanted ads. When a program is running, the virus attached to it could infiltrate your hard drive and also spread to USB keys and external hard drives. Any attachment you create using this program and send to someone else could also infect them with the virus. |
|
How do u know if your pc is infected?
|
Here are a few things to check for:
•It takes longer than usual for your computer to start up, it restarts on its own or doesn't start up at all. •It takes a long time to launch a program. •Files and data have disappeared. •Your system and programs crash constantly. •The homepage you set on your web browser is different (note that this could be caused by Adware that has been installed on your computer). •Web pages are slow to load. •Your computer screen looks distorted. •Programs are running without your control. If you suspect a problem, make sure your security software is up to date and run it to check for infection. If nothing is found, or if you are unsure of what to do, seek technical help. |
|
Worms are a common threat to computers and the Internet as a whole
|
A worm, unlike a virus, goes to work on its own without attaching itself to files or programs. It lives in your computer memory, doesn’t damage or alter the hard drive and propagates by sending itself to other computers in a network – whether within a company or the Internet itself.
What they can do: •Spread to everyone in your contact list. •Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking havoc on an internal network and costing companies enormous amounts of lost revenue. |
|
What is a cookie?
|
A collection of information, usually including a username and the current date and time, stored on the local computer of a person using the World Wide Web, used chiefly by websites to identify users who have previously registered or visited the site.
|
|
distributed denial of service
|
DDOS, short for Distributed Denial of Service, it is an attack where multiple compromised systems (which are usually infected with a Trojan) are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack. (Webopedia)
|
|
DNS: Domain Name System
|
A system for converting host names and domain names into IP addresses on the Internet or on local networks that use the TCP/IP protocol. For example, when a Web site address is given to the DNS either by typing a URL in a browser or behind the scenes from one application to another, DNS servers return the IP address of the server associated with that name.
|
|
function
|
Excel functions are built-in prewritten formulas that make it easy to do complex procedures with numbers, dates, times, text, and more.
|
|
protocol
|
An agreed-upon format for transmitting data between two devices. The protocol determines the following:
•the type of error checking to be used •data compression method, if any •how the sending device will indicate that it has finished sending a message •how the receiving device will indicate that it has received a message |
|
What is a RSS?
|
(Really Simple Syndication) A syndication format that was developed by Netscape in 1999 and became very popular for aggregating updates to blogs and news sites.
|
|
Google Alert
|
Google Alerts are email updates of the latest relevant Google results (web, news, etc.) based on your choice of query or topic.
|
|
Google Reader
|
Google Reader is a tool for gathering, reading, and sharing all the interesting blogs and websites you read on the web. This guide can help you familiarize yourself with the main features of Google Reader so that you can get started subscribing to and sharing feeds.
|
|
WolframAlpha
|
Wolfram|Alpha is the world's first and only computational knowledge engine. It can Compute answers, It's NOT a SEARCH engine!!
|
|
data visualization
|
present data that is easier to understand
|
|
IT Infrastructure
|
collection of hardware, software, users, processes and networks
|
|
data, or raw data
|
refers to raw material fr which info's produced.
Ex: # of hrs employee worked in 1 week |
|
Info
|
data thats been processed, organized so it has meaning/value to person receiving it
|
|
knowledge
|
consists of data & or info that has been processed, org. and put into context to be meaningful and convey understanding
|
|
database
|
stored data organized for access, retrieval, search & update
|
|
text
|
unstructured data & an asset that can be managed
|
|
text mining
|
powerful software tools that can extract & discover knowledge fr text docs.
|
|
data warehouse
|
special type of database that aggregates data fr transaction databases so it can be analyzed.
|
|
data management
|
structured approach for capturing, storing, processing, integrating, distributing, securing & archiving data effectively throughout its lifecycle
|
|
enterprise portals
|
set of software applications that consolidate, manage, analyze & transmit data to the users thru web-based interface
|
|
master data management (MDM)
|
process where companies integrate data fr various sources to provide a more unified view of data
|
|
data entity
|
anything real or abstract about which a company wants to collect & store data (customer, vendor, employee, product)
|
|
Master data entities
|
are main entities of a company, such as:customers, products, suppliers, employees&assets
|
|
data mart
|
small data warehouse designed for a SBU (strategic business unit) or a single dept.
|
|
ETL
|
Extract, transform & load
|
|
data mining (aka data discovery)
|
process of analyzing data from different perspectives & summarizing it into info that can increase revenue, decrease costs-or both
|
|
GIGO
|
garbage in, garbage out
potentially riskier garbage in, gospel out (poor quality data is used as basis for planning) |
|
data quality
|
a measure of the datas usefulness as well as the quality of the decisions based on data
|
|
data quality has 5 dimensions:
|
accuracy,accessibility, relevance,timeliness & completeness
|
|
document management
|
automated control of imaged & electronic documents, page images, spreadsheets, email, voice messages from creation to destruction
|
|
DMS(document management systems)
|
hardware&software that manage & archive electronic docs & convert paper docs into e-docs, then index & store them EX: business required to hold docs for 7yrs
|
|
DMS help business become more efficient by:
|
1)enabling comp. to access & use content contained in data
2)cut labor costs 3)reduce time & effort 4)improve security of content 5)minimize costs(printing,storing & searching) |
|
green computing
|
is initiative to conserve our natural, valuable resources by reducing the effects of our comp. usage on the environment
|
|
Bit
|
smallest unit of data that can be processed, either a 0 or 1
|
|
Byte
|
a group of 8 bits, usually called a character(letter, # or symbol)
|
|
field
|
characters that are combined to form a word, group of words or a complete #
|
|
File
|
collection of related records
|
|
database
|
a logical group of related files
|
|
attribute
|
customer name, invoice # or order date...
|
|
primary key
|
unique identifier field, usually numeric. helps pull up specific account
|
|
sequential file organization
|
which is way files are org. on tape, data must be retrieved in same physical sequence are stored. like a tape recorder
|
|
direct file organization, or random file organization
|
records can be accessed directly regardless of location on storage medium. Like a DVD Drive
|
|
ISAM(index sequential access method)
|
uses an index of key fields to locate individual records
|
|
mobility
|
secure reliable access from anywhere at acceptible speeds
|
|
collaboration
|
working as a team or with others having access to and or sharing docs and files
|
|
relationships
|
maintaining contact with customers, supply partners, shareholders, employees
|
|
2 types of switching are:
|
1)circuit switching:older tech. POTS (plain old telephone service)
2)packet switching:path of signal is digital, neither dedicated or exclusive. break a file into packets, when reach destination-are re organized |
|
routers
|
devices that forward packets fr 1 network to another, connect networks that use different ntwrk technologies.
|
|
bandwidth
|
measure of speed at which data is transmitted, throughput capacity of a ntwrk.
|
|
TCP/IP
|
transmission control protocol/internet protocol
|
|
broadband
|
short for broadbandwidth, FAST transmission speed
|
|
download speed
|
how quickly data can be received fr the internet, how fast a connection can deliver data to a mobile or pc
|
|
upload
|
how fast a connection can transfer data fr the source comp. or mobile device. dl is faster then upldng.
|
|
fixed line broadband
|
either cable or DSL internet connections
|
|
mobile broadband
|
various types of wireless, hi-speed internet access thru a portable modem
|
|
IP networks
|
form backbone of worldwide digital ntwrkng. encourage merger of voice,data,video,&radio waves.can be digitized into packets & sent via any digital ntwrk
|
|
ntwrk devices & technologies:
|
laptops,pda's,cell&smart phones,wikis,intranets,extranets,GPS,POS(point of sale),RFID(radio frequency identification)-communicated with networks to send/receive data. DATA must be Rapidly collected,processed,shared,&acted upon
|
|
mobile infrastructure
|
consists of integration of technology,software,support,security measures&devices for mngmnt & delivery of wireless communications
|
|
wi-fi
|
technology that allows computers to share network or internet connection wirelessly w/o need to connect to commercial network. They beam LARGE chunks of data over short distances using part of radio spectrum
|
|
3 types of wireless networks:
|
1)WAN (wide area network)
2)Wimax 3)WWAN(wireless wide area ntwrks) |
|
WLAN
|
wireless local area network, uses hi-frequency radio waves rather then wires to communicate between devices
|
|
WIMAX
|
standards based techn. enabling delivery of last mile wireless broadband access as alternative to cable and DSL (free internet)
|
|
intranet
|
a network serving international informational needs of a company. Are portals(gateways) that provide easy & inexpensive browsing & search capabilities.
|
|
enterprise search
|
provides fast query response & consolidated, ranked results (like google) that help users easily locate info they need.
|
|
extranet
|
private,company-owned network that uses IP technology to securely share part of a business' info or operations w/suppliers,vendors,partners,customers, or other business'. Can us VPN(virtual private ntwrks)
|
|
VPN
|
created using specialized software/hardware to encrypt,send,decrypt transmissions over the internet. Creates a 'private tunnel' for 2 companies
|
|
Portal
|
web based gateway to the content on a network. Like discussion boards,doc.sharing and workspaces.
|
|
google wave
|
equal parts documentation and conversation. Its a new platform of email, im'ing and docs. PPl can communicate & work together-reply mssg, edit,add participants
|
|
MAC address
|
Media Access Control Address: the unique serial number burned into ethernet & token ring adapters that identifies that network card from all others
|
|
NIC
|
Network Interface Cards:
|
|
Moore's Law:
|
Gordon Moore, founder of the Intel Corp. stated in 1965 thatthat the number of transistors on a microprocessor would double periodically (approximately every 18 months).
|
|
changedetection.com
|
an alert by email when a website page changes
|
|
prezi
|
a web based presentation tool using a map and layout & zooming to show shortcomings of microsoft powerpoint
|
|
protection power
|
a canadian company that specializes in personal information protection services
|
|
DHCP (Dynamic Host Configuration Protocol)
|
network configuration protocol for hosts on IP networks.
|
|
Whois
|
domain search
|
|
traceroute
|
computer network diagnostic tool for displaying the route(path)& measuring transit delays of packets across an IP network
|
|
DWY
|
Driving while yakking
|
|
NHTSA
|
National Highway Traffic Safety Administration
|
|
SAR
|
Specific Absorption Rate: the measure of rf (radio frequency) that is absorbed by the body
|
|
business continuity plan
|
aka the disaster recovery plan
|
|
risk management analysis
|
expected loss=p1xp2xl
|
|
SOX (Sarbanes Oxly Act)
|
anti-fraud law
|
|
WEP
|
wired equivalent privacy:
|
|
two factor authentication
|
aka multi-factor authentication:
|
|
network security has 3 types of levels
|
1)perimeter security, to access the network
2)authentication:to verify the identity of person,username, passwords 3)authorization:controls what authenticated users can do once access network, permissions and directories |
|
biometric control
|
automated method of verifying identity of person, thumbprint, fingerprint, retinal scan,voice scan,signature
|
|
IDS (intrusion detection systems)
|
scans for unusual or suspicious traffic
|
|
unintentional threats fall into 3 categories:
|
1)human error, environmental hazards, and computer system failures
|