IA Knowledge VI Flashcards
(110 cards)
A computer network made up of local-area networks over a large area (e.g., nation or world) using multiple transmission media.
Wide-area network (WAN)
Self-replicating malicious software that can disrupt networks or computers.
Worm
Malicious code that attaches itself to storage media, documents, or executable files and is spread when the files are shared with others.
Virus
Use open Internet protocols and standards to create stand-alone, modular software called services that are capable of describing themselves and integrating with other similar services.
Web services
The combination of transfer protocol, domain name, directory path, and document name.
Uniform Resource Locator
A secure method of connecting two points on the Internet, often run by an Internet service providers.
Virtual private network (VPN)
A type of firewall that enhances packet filtering by monitoring packet flows in general.
Stateful inspection
Process or transaction-level controls that must be in place for management and governance controls to be effective. They are usually specific to a given application but may also control larger technical processes such as system access rights.
Technical controls
Unsolicited bulk e-mail.
Spam
A network topology in which each device is wired to a central device that routes data to or from other devices, eliminating the need to wire between devices.
Star network
A contract between an organization and a software vendor specifying terms of use.
Software license agreement
Making illegal duplicate copies of software or installation of software beyond what is allowed in a license agreement.
Software piracy
A powerful computer with high bandwidth dedicated to a specific task such as providing access to files or managing the common application needs of an organization.
Server
A software system design that allows for sharing of Web services as needed; a service consumer gets Web services from various service providers.
Service-oriented architecture (SOA)
The overall rules for a database.
Schema
The processes an organization puts into place so that security controls and expenditures are fully commensurate with the risks to which the organization is exposed.
Security risk management
The acceptable levels of variation relative to the achievement of objectives.
Risk tolerance
In terms of networking hardware, an intelligent processor that networks devices using protocols.
Router
A database management system that is arranged into two-dimensional files called tables, with links between tables that share a common attribute.
Relational database
A network topology in which the network is arranged in a circle, so two paths for data are available.
Ring network
In a database, a logical grouping of fields.
Record
A hardware control in which each transmitted data element receives an additional bit (character) of data mathematically related to the data; abnormal changes will void the mathematical relationship.
Redundant character check
Automated error checks built into computer processing as well as segregation of duties such as controlling programmers’ access to files and records. They check that data processing tasks are accurate, complete, and valid.
Processing controls
An encryption method in which two keys are created, private and public. The sender places the public key in a directory or an application automatically applies it to lock sent data; to decrypt the data, the private key must be used
Public key encryption