Chapter 2 Key Concepts and Terms Flashcards Preview

Fundamentals of Information Systems Security > Chapter 2 Key Concepts and Terms > Flashcards

Flashcards in Chapter 2 Key Concepts and Terms Deck (27)
Loading flashcards...
1

Anything as a Service (AaaS)

A new technology offering a solution that is hosted by a third-party vendor typically within a cloud infrastructure. By hosting within a cloud infrastructure, a one-to-many delivery solution can be supported. This type of delivery solution allows for a recurring revenue model where the customer pays a monthly fee for the use of the technology, hardware, or software solution.

2

Application Service Provider (ASP)

A software company that builds applications hosted in the cloud and on the internet and commercially sells that application in a one-to-many delivery model

3

Availability

A mathematical formula that quantifies the amount of uptime for a system compared to the amount of downtime. Usually displayed as a ratio

4

Bring Your Own Device (BYOD)

An organizational policy of allowing or even encouraging employees, contractors, and others to connect their own personal equipment to the corporate network; this offers cost savings but requires proper security controls, policies, and procedures.

5

Business-to-business (B2B)

A term used to describe a business that builds online systems with links for conducting business-to-business transactions, usually for integrated supply-chain purchases and deliveries.

6

Business-to-consumer (B2C)

A term used to describe online storefront for consumers to purchase goods and services directly.

7

Collaboration

A software-based application like WebEx that supports audio conferencing and sharing of documents (text, spreadsheets, presentations, etc.) for real time decisions with team members or colleagues.

8

Confidentiality

The requirement to keep information private or secret

9

De-Identified Data

data about an individual that contains no information that could be linked to a specific individuals identity (e.g. name, address, date of birth, etc.)

10

Digital Media

Any digitally recorded or captured audio, video, or image file.

11

End of Life

A term used to describe the data by which the vendor or manufacturer ceases to support and provide software updates and patches for a product or software application

12

Family Educational Rights and Privacy Act (FERPA)

A US federal law that protects the private data of students, including their transcripts and grades, with which K-12 and higher education institutions must comply

13

Federal Financial Institutions Examination Council (FFIEC)

An interagency body of five U.S. regulatory agencies that exist to "promote uniformity & consistency in the supervision of financial institutions.

14

Integrity

The validity of information or data. Data with high integrity has not been altered or modified.

15

Internet Engineering Task Force (IETF)

A standards organization that develops and promotes internet standards

16

Interoperability

A term used to describe computers, devices, or applications that can be configured to work together.

17

Metadata

A term used to refer to data about data (e.g. there are 100 entries in the database table, of the 100 entries, 99 were inputted manually and 1 was inputted automatically, etc.)

18

Mobile IP

a protocol for allowing mobile devices to transparently switch LAN segments

19

Payment Card Industry Data Security Standard (PCI DSS)

A standard, not a compliance law, for merchants and service providers regarding safeguarding the processing, storage, and transmission of cardholder data

20

Privacy

The protection of individual rights to non-disclosure

21

Radio Frequency Identification

A technology that exchanges data through a wireless connection between a reader and a tag attached to a product to track the movement of the product

22

Real-time communication

A communication method in which messages are sent directly to the recipient immediately

23

Search Engine Optimization (SEO)

Refers to the strategies used to make a site more browser-friendly

24

Security

A control such as a policy, procedure, and physical thing like a gate that is used to protect something from risks, threats, and vulnerabilities

25

Software as a Service (SaaS)

A model of software deployment or service where customers use applications on demand.

26

Store-and-forward communications

The technique of relaying communications between two or more users by intermediate storage. Delivery from sender to a central storage is immediate, but the final transmission to the recipient depends upon availability and a request for the stored information.

27

Unified Messaging

The storage of fax, email, and voice communications in a single location