Chapters 7, 8, 10, 21 Flashcards

Exam 2 (145 cards)

1
Q

Disruptive technology

A

refers to a technology whose application affects the
way market or industry functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Characteristics of disruptive technologies

A

They come to market with a set of performance attributes that existing customers do not value.

Over time the performance attributes improve to the point where they invade established markets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Incumbent Technologies

A

Established market-leading technologies that currently dominate a particular industry or market segment.

These technologies are typically developed and maintained by large, established firms that have significant market share and have built robust ecosystems around their products, including complementary technologies, user bases, and switching costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2 pros and cons of incumbent technologies

A

Pros (resistance to disruption & benefit from network effects – hard for new things to replace them)

Cons (prioritize the current consumer demand which can lead to a strategic blindness where companies miss opportunities to adapt to new technological paradigms, potentially allowing startups to eventually overtake them in the market)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

______ innovations don’t need to perform better than ______; they simply need to perform well enough to ____ to the customers of the _____(and often do so at a _____price).

A

Disruptive innovations don’t need to perform better than incumbents; they simply need to perform well enough to appeal to the customers of the incumbents (and often do so at a lower price).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Enabling technology

A

An innovation or invention that makes a product affordable and accessible to a wider population

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Innovative business model

A

A business model that targets new
consumers that didn’t buy products in an existing market, or low-end
consumers (the least profitable customers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Coherent value network

A

A network in which suppliers, distributors and
customers are better off when the disruptive technology prospers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

bitcoin

A

An open source, decentralized payment system (sometimes controversially referred to as a digital, virtual, or cryptocurrency) that operates in a peer-to-peer environment, without bank or central authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

McNamarra Fallacy

A

When one falls victim to decision-making based solely on quantitative observations linked to past events. In disruptive innovation, in particular, new occurrences are happening that change consumer behavior, markets, and the nature of competition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

KPI (key performance indicators)

A

Key performance indicators—measurable values defined by a firm to demonstrate progress toward a given goal.

Examples are quite broad and could include customer acquisition, cost reduction, or improvement in the ROI of online ad campaigns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Additive Manufacturing

A

Another term for 3D printing.

A technology where parts are built by adding material, rather than carving, milling, or machining parts from a larger block of material.

In additive manufacturing, waste is minimized and techniques can sometimes produce products that are impossible to replicate with conventional methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

cryptocurrencies

A

A digital asset where a secure form of mathematics (cryptography) is used to handle transactions, control the creation of additional units, and verify the transfer of assets.

Cryptocurrencies usually take advantage of a technology known as a blockchain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

blockchain

A

A distributed and decentralized ledger that records and verifies transactions and ownership, making it difficult to tamper with or shut down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DeFi (decentralized finance)

A

An industry term for a bucket of blockchain-enabled financial services that function without the need for a central authority, such as a bank or government. Proponents believe that DeFi can be more transparent, secure, and efficient than traditional financial systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CBDC (Central Bank Digital Currencies)

A

A digital form of a government-issued currency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

stablecoins

A

Cryptocurrencies that have their value pegged to a currency or commodity, rather than have currency value float independently.

Stablecoins are issued by independent entities, not government central banks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NFT (Non-fungible token)

A

The NFT can be embedded in digital products, such as art and images, identifying ownership, which is recorded on a blockchain.

The blockchain can verify authenticity, and transferring the token transfers ownership, in theory creating more secure markets for digital artwork, and providing a way for digital product owners to enforce copyright and ownership claims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

subtractive manufacturing

A

Manufacturing processes where material is removed from a larger block to create a part (e.g., milling, carving).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

bitcoin strengths & limitations

A

strengths
decentralization: No central authority controls Bitcoin.
eliminates transaction fees
used for international commerce without delay or transaction fees
straddles the line between transparency and privacy

limitations
volatility: Bitcoin’s value can fluctuate wildly, making it less useful as a stable currency.
scalability: The Bitcoin network can handle only a limited number of transactions per second.
difficult to understand/use technology
has bad reputation (drug dealers, tax evaders, etc)
security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

blockchain strengths and limitations

A

strengths
Transparency: All transactions are recorded on a public ledger.
Security: Cryptographic techniques make it difficult to tamper with the blockchain.
Efficiency: Can reduce the need for intermediaries, lowering transaction costs.

limitations
Scalability: As the blockchain grows, it becomes more difficult to manage.
Energy Consumption: Mining cryptocurrencies like Bitcoin requires significant energy.
Regulatory Challenges: Governments are still developing frameworks for blockchain technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DeFi strengths and limitations

A

strengths
Transparency: All transactions are recorded on a blockchain.
Efficiency: Lower transaction costs and faster processing times.
Accessibility: Opens financial services to those without access to traditional banking.

limitations
Security: High-profile hacks have led to significant losses.
Regulation: Lack of consumer protection and regulatory oversight.
Adoption: Still in the early stages, with many technical and legal hurdles to overcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In regards to disruptive technologies, when does change happen?

A

Technologies are not likely to be disruptive on their own.
* Change happens when a company or industry adapts the technology to cater
to one piece of the customer value chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
why do big firms fail?
Failure to see disruptive innovations as a threat. - Reason: Lack of dedicated resources for developing the potential technology since these technologies are unattractive. - Creates blindness by an otherwise rational focus on customer demands and financial performance. Start-ups amass expertise quickly. - Big firms are forced to play catch-up. Few ever close the gap with the new leaders
26
how can big companies overcome issues in regards to disruptive technologies?
remove short-sighted, customer focused, and bottom line obsessed blinders have conversations with those on the experimental edge of advancements if employees are quitting to join a tech, it might be worth considering started by former employees
27
what to do when a potential disruptor is spotted?
build a portfolio of options on emerging technologies, investing in firms, start-ups, or internal efforts options give the firm the right to continue and increase funding as a technology shows promise if a firm has a stake in a start-up, it may consider acquiring the firm encourage new market and technology development
28
Amazon's 3 Pillars
Selection, customer experience, and low prices (work together to create competitive advantage)
29
Amazon’s Proteus Robot
Entirely autonomous Works alongside humans Robots like this are designed to offer cues to their human co-workers to make robot intentions clearer and perhaps even pleasant to work with. Ex: rather than stop abruptly in a way that might startle a person, robots recognize humans from a distance and stop gradually when they can.
30
Amazon’s Sparrow
Robotic Arm that can identify an individual item from a tray of different goods thru multi-modal identification It has deployable suction cups at the end of extenders which helps it pick up stuff
31
Multi-modal identification
an array of sensors on the arm or positioned nearby that quickly scan bar codes, read packaging text using optical character recognition, and identify products using image recognition AI
32
Accounts payable
Money owed for products and services purchased on credit
33
Cash conversion cycle (CCC)
Period between distributing cash and collecting funds associated with a given operation (e.g., sales).
34
Liquidity problems
Problems that arise when organizations cannot easily convert assets to cash. Cash is considered the most liquid asset—that is, the most widely accepted with a value understood by all.
35
Inventory turns
the number of times inventory is sold or used during a specific period (such as a year or quarter). A higher figure means a firm is selling products quickly
36
Amazon has a ___CCC and aims to have ____ inventory turns to pay suppliers later
Negative, high It actually sells goods and collects money from customers weeks before it has to pay its suppliers. This gives the firm a special advantage since it has an additional pool of cash that it can put to work on things like expanding operations, making interest-bearing investments, and more (- CCC)
37
Deep learning machine learning models
A type of machine learning that uses multiple layers of interconnections among data to identify patterns and improve predicted results. Deep learning most often uses a set of techniques known as neural networks and is popularly applied in tasks like speech recognition, image recognition, and computer vision.
38
Amazon uses dynamic pricing which means
Pricing that shifts over time, usually based on conditions that change demand (e.g., charging more for scarce items). Can help to maximize their profits, but consumers might be mad & feel like they're being taken advantage of
39
A/B test
A randomized group of experiments used to collect data and compare performance among two options studied (A and B). A/B testing is often used in refining the design of technology products, and A/B tests are particularly easy to run over the Internet on a firm’s website. Amazon, Google, and Facebook are among the firms that aggressively leverage hundreds of A/B tests a year in order to improve their product offerings. It found that recommendations do drive revenue.
40
p13n
Amazon’s way of internally referring to user data, which fuels personalization efforts When visiting the Amazon home page, it’s more accurate to say that you’re visiting your Amazon home page at a given point in time. Your page may vary not only based on any ongoing A/B tests but also based on Amazon’s best guess of what you’ll want to see as well as any myriad of other sales and promotion goals.
41
cookie
A line of identifying text, assigned and retrieved by a given Web server and stored by your browser
42
Collaborative filtering
A classification of software that monitors trends among customers and uses this data to personalize an individual customer’s experience.
43
retargeting
Presenting a customer with promotions on third-party websites based on their in-store browsing activities.
44
Two-sided network effects
Products or services that get more valuable as two distinct categories of participants expand (e.g., buyers and sellers). (i.e., more buyers attract more sellers, and more sellers attract more buyers — Amazon & 3rd party sellers)
45
Amazon Marketplace allows Amazon to build a long tail of product offerings without the costly risk of lasting inventory. What is a long tail?
In this context, it refers to an extremely large selection of content or products. The long tail is a phenomenon whereby firms can make money by offering a near-limitless selection. (demand exists, even though products aren’t popular enough for stores to carry them)
46
Amazon’s affiliate marketing program
Marketing practice where a firm rewards partners (affiliates) who bring in new business, often with a percentage of any resulting sales. offering a sort of “finder’s fee” for generating sales
47
Flash sales
Offering deep discounts of a limited quantity of inventory. Flash sales often run for a fixed period or until inventory is completely depleted. Players include Gilt Groupe and Amazon’s Zulily in fashion, and One Kings Lane in home décor.
48
logistics
The process of managing how resources are acquired, stored, and transported to their final destination.
49
Fulfillment costs
The process of managing how resources are acquired, stored, and transported to their final destination.
50
70% of Amazon’s cost in purchasing Whole Foods was categorized as “goodwill”. What does that mean?
An accounting term for an intangible asset above and beyond the operations value of the firm. Goodwill can include the perceived value of the company’s brand name, customer base, loyalty, positive employee relations, as well as proprietary technology and patents.
51
Amazon now rents out their technology stack. What is a technology stack?
All of the technology products and services used to build and run one single information technology solution (from voice recognition through back-end processing)
52
White label
A fully supported product or service that's made by one company but sold by another. The term was popular by branded appliances, like Sears Kenmore, which were often designed and manufactured by established firms such as Maytag and General Electric. The term is now used in all sorts of products and services, including white label apps offered by GrubHub/LevelUp, which power branded apps at the salad firm Sweetgreen, or Amazon's Alexa Custom Assistant, used to produce custom voice assistants for Fiat Chrysler.
53
Internet latency
A term often used in computing that refers to delay, especially when discussing networking and data transfer speeds. Low-latency systems are faster systems.
54
Channel conflict
Exists when a firm’s potential partners see that firm as a threat. This threat could come because it offers competing products or services via alternative channels or because the firm works closely with especially threatening competitors. Amazon has become a victim of channel conflict when other retailers have dropped its offerings. For example, Barnes & Noble and other book retailers have refused to carry titles from Amazon’s publishing arm.
55
Fire TV and Alexa services are thin devices, what does that mean?
Thin or thin client computing devices have very little computing power in the device itself, and instead perform the bulk of computing and storage over the network, “in the cloud.” Smart speakers and television streaming sticks are all examples of thin clients. The term “thin client” is also sometimes used to describe applications that run in a browser, but where most of the computing happens remotely (e.g., SaaS tools like Salesforce).
56
Why would a company trust another firm, especially those who consider Amazon as a rival, with their computing infrastructure?
Lower costs due to cloud computing, the AWS cloud providers maintain the hardware, security, and software Scalability: increase capacity when need more computing and storage while scaling back on usage during periods of low demand Expertise: cloud providers have more expertise so less cost to train Speed and flexibility: Staff freed of this overhead should be able to develop and deploy systems faster than if they had to handle everything themselves, in-house
57
Hybrid clouds
Cloud computing architectures that combine on-premises infrastructure with public cloud services, such as those provided by AWS or Microsoft Azure. A hybrid cloud might “turn on” public cloud resources as needed, if an organization's existing infrastructure can't meet surging demand. where work runs on internal systems, but shifts capacity to the cloud as extra resources are needed (you may hear such shifts of capacity to the cloud during times of usage spikes referred to as bursting)
58
bursting
Shifting capacity to a cloud provider during periods of high demand. A firm that can take advantage of bursting to scale its information systems should never see its resources overtaxed since it can always rely on its partner to pick up any slack, as needed.
59
instance
Instance is a computer term that refers to creating a software-based copy using a pre-defined model. Using AWS, one can create multiple instances of computing resources, such as a Windows server, as needed. The instance of a server isn’t a physical computer, but a software model that operates just like it were a physical computer. (virtual machine or virtual server)
60
multiple instances can be run on a single physical server, true or false
true
61
Amazon Web Services (AWS)
allows anyone with a credit card to access industrial-strength, scalable computing resources. Services include computing capability, storage, and many operating systems, software development platforms, and enterprise-class applications. AWS is responsible for the majority of Amazon’s operating profit and, if considered a separate business, would be as big as a Fortune 100 company
62
Amazon’s EC2
creates “virtual” servers that can be configured and operated in the cloud, just as if they were local devices running on site EC2 offers more flexibility but requires more setup and maintenance
63
Amazon’s Lambdas
functions that can be written in a variety of programming languages and which execute in the cloud, hiding the infrastructure from the software developer Lambdas are less flexible but require less maintenance and can be set up very quickly
64
Amazon’s S3
can store anything in a limitlessly expanding, cloud-based, hard-drive equivalent
65
Amazon’s Redshift
a storage and tools solution for data warehousing; and various additional services that provide relational and noSQL databases
66
Foundation model
A type of general purpose AI that can be further refined and built upon to perform a wide variety of specific tasks.
67
Amazon has also begun to roll out services into so-called vertical solutions. What are vertical solutions?
Solutions targeted at a specific industry, such as health care or manufacturing.
68
reinforcement learning through human feedback(RLHF)
An AI development approach that uses human guidance to train and “reward” a model for accurate performance
69
Anthropic constitutional AI
As opposed to RLHF, which uses human feedback for reward-based AI training and refinement, constitutional AI explicitly codes a set of principles that are used to train the model. Proponents of constitutional AI believe this creates safer, more reliable models.
70
Drop shipping
A type of retail where the seller collects an order, then passes it to the supplier, who ships product directly to the customer. In this way, the seller acts as a middleman and never takes possession of the items that are sold. where the seller simply acts as an order-taking middleman, then has the manufacturer ship the product directly to the consumer
71
What does Shopify do?
Shopify sells a subscription to cloud-based tools that allow a firm to quickly set up an online e-commerce shop. The firm has laid off staff, dropped plans to become a fulfillment operator, and partnered with Amazon in an attempt to return to profitability; however, competition from Shopify-style offerings from Amazon, TikTok, and the rise of Shein and Temu pose challenges.
72
Amazon’s Kindle Business
Kindle connects customers to the firm’s product offerings and inventory. – Firm’s top-selling product. – Arrives linked to the customer’s Amazon account. * The Kindle’s market position allowed it to undercut competition: – Kindle Fire was offered at half the price of its competition. – Kindle versions are sold at or below costs. – Digital publishing enables titles to enter the market far faster than physical offerings
73
What happened to Amazon’s wholesale pricing as publishers switched to agency pricing?
It was endangered
74
Wholesale pricing
Paying publishers for titles and then selling the books at whatever price it wanted (keep and sell)
75
Agency pricing
Publisher sets the price and the reseller gets a cut (Expedia.com)
76
Staying power
Long-term viability of a product or service
77
Total cost of ownership (TCO)
Economic measure of the full cost of owning a product
78
complementary benefits
Products or services that add additional value to the primary product or service that makes up a network
79
Platforms
Allow for the development and integration of software products and other complementary goods
80
value-adding sources
work together to reinforce one another to make the network effect even stronger (Each add-on of an iOS product enhances the value of choosing it over a rival)
81
metaverse
Immersive digital worlds
82
One-sided market
A market that derives most of its value from a single class of users
83
Same-side exchange benefits
Benefits derived by interactions among members of a single class of participant
84
Two-sided market
A network markets that compromises 2 distinct categories of participant, both of which are needed to deliver value for the network to work
85
Cross-side exchange benefit
When an increase in the number of users on one side of the market (ex: console owners) creates a rise in the other side (software developers)
86
monopoly
A market with many buyers and one dominant seller
87
oligopoly
A market dominated by a small number of powerful sellers
88
“Break up” of a firm
A requirement to use public & open standards, to share infrastructure, and turning the dominant platform into a public utility
89
Technological leapfrogging
Competing by offering a new technology that is so superior to existing offering that the value overcomes the total resistance that older technologies might enjoy via exchange, switching costs & complementary benefits
90
Trust proxies (social proof)
The positive influence created when someone finds out that others are doing something
91
Blue ocean strategy
An approach where firms seek to create and compete in uncontested new “blue ocean” market spaces, rather than competing in spaces and ways that have attracted many similar rivals.
92
convergence
when two or more markets, once considered distinctly separate, begin to offer similar features and capabilities (GPS)
93
envelopment
where a firm seeks to make an existing market a subset of its product offering (Apple morphing iPod into iPhone)
94
Backward compatibility
The ability to take advantage of complementary products developed for a prior generation of technology
95
adaptor
A product that allows a firm to tap into the complementary products, data, or user base of another product or service
96
The Osborne Effect
When a firm preannounces a forthcoming product or service and experiences a sharp and detrimental drop in sales of current offerings as users wait for the new item
97
Congestion effects
occur when increasing numbers of users lower the value of a product or service, when key resources become more scarce
98
Network effects (Metcalfe’s Law)
The value of a product or service increases as its number of users expands
99
Switching costs
Incurred when moving from one product to another Directly related to staying power Strengthen the value of network effects
100
The value derived from network effects comes from three sources which are?
exchange, staying power, and complementary benefits.
101
Customer acquisition costs (CAC)
The amount of money a firm spends to convince a customer to buy (or in the case of free products, try or use) a product or service. CAC is a cost, so firms that can keep CAC low should be able to realize potential profits faster
102
data harvesters
Cybercriminals who infiltrate systems and collect data for illegal resale
103
Cash-out fraudsters
Criminals who purchase assets from data harvesters to be used for illegal financial gain. Actions may include using stolen credit card numbers to purchase goods, creating fake accounts via identity fraud, and more.
104
botnets
Networks of infiltrated and compromised machines controlled by a central command (used for illegal activity), think spam, hard to track fraud, DDoS attacks
105
Distributed Denial of Service (DDoS)
Effectively shutting down websites by overwhelming them with a crush load of seemingly real requests sent simultaneously by thousands of machines
106
Malicious pranksters
trolls or griefsters
107
hactivists
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage
108
hacker
A term that, depending on the context, may be applied to either (1) someone who breaks into computer systems, or (2) a particularly clever programmer.
109
hack
A term that may, depending on the context, refer to either (1) breaking into a computer system, or (2) a particularly clever solution.
110
white hat hackers
Someone who uncovers computer weaknesses without exploiting them. The goal of the white hat hacker is to improve system security.
111
black hat hackers
computer criminals
112
red team
A term, taken from the military, where a trained team, unaffiliated with development staff, plays the role of adversary and tries to deliberately compromise systems. Red team reports are then shared with IS staff so that systems can be hardened, or secure, against attack and misuse.
113
blue team
Defensive security professionals responsible for maintaining internal network defenses against cyberattacks and threats
114
zero-day exploits
Attacks that are so new that they haven’t been clearly identified, and so they haven’t made it into security screening systems
115
deepfakes
Sophisticated media (audio, image, video) created by AI that attempts to look or sound like a real person or event
116
script kiddies
An unsophisticated hacker that relies on scripts or downloaded programs to perpetrate hacking rather than develop original exploits
117
biometrics
Technologies that measure and analyze human body characteristics for identification or authentication (fingerprints, retina, voice, face id)
118
tokenization
Sends one-time-use representations of a credit card over the internet
119
public key cyrptography
A type of security where two keys are generated, a public key and a private key. When one key is used to “lock” or encrypt data, it can only be “unlocked” or decrypted by its possible (public->private, private->public). Keys are so large and complex that it's considered impractical to crack public-key cryptography by repeatedly guessing (often called a “brute force” attack) even if one had access to the world's most advanced supercomputer
120
DNS Cache-poisoning
Redirect DNS (domain name service) to IP address mapping to another website; you think you’re going to visit your bank’s website, but actually it redirects you to a link that drains your bank account
121
dumpster diving
sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack. This might include hunting for discarded passwords written on Post-it notes, recovering unshredded printed user account listings, scanning e-mails or program printouts for system clues, recovering tape backups, resurrecting files from discarded hard drives, and more
122
shoulder surfing
simply looking over someone’s shoulder to glean a password or see other proprietary information that might be displayed on a worker’s screen (gaining compromising info thru observation)
123
encyrption
Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who don’t have the unlocking key
124
key (encryption)
Code that unlocks the encryption
125
brute-force attacks
An attack that exhausts all possible password combinations in order to break into an account. The larger and more complicated a password or key, the longer a brute-force attack will take (trial-and-error method)
126
intrusion detection systems
Specifically look for unauthorized behavior, sounding the alarm and potentially taking action if something seems wrong
127
honeypots
A seemingly tempting, but bogus target meant to draw hacking attempts. By monitoring infiltration attempts against a honeypot, organizations may gain insight into the identity of hackers and their techniques, and they can share this with partners and law enforcement (bait for hackers)
128
blacklist
denying the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions
129
whitelists
permitting communication only with approved entities or in an approved manner
130
corporate espionage
Might be performed by insiders, rivals or even foreign governments
131
ransomware
Uses encryption to lock assets and then ask for $ to unlock
132
cyberwarfare
Increasingly used tool among both spy agencies and military orgs, and the fallout can be spread far beyond the borders of the nations in conflict
133
bad apples
Rogue employees who steal secrets, install malware, or hold a firm hostage
134
social engineering
A non-technical strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practicesp
135
phishing
Cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need Ex: request from bank, note from someone in their company, click a link or download an attachment
136
spoofing
the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites
137
viruses
infect other software or files
138
worms
Take advantage of security vulnerability to automatically spread
139
trojans
Attempt to sneak in by masquerading as something they're not
140
malware
Any program or file that is harmful to a computer user
141
Push-button hacking
Tools designed to easily automate attacks
142
certificate authority
Trusted third party that provides authentication services in public key encryption schemes
143
audits
Real-time monitoring of usage: announced & surprise
144
patches
Software updates that plug existing holes
145
firewalls
Control network traffic, block unauthorized traffic