WEEK 11 FINALS Flashcards

1
Q

This are facts, text, images, sound or video that may or may not be useful for a particular task for a particular organization.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It can take various forms, such as numbers, text, images, or any other type of input that can be encoded for processing.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data values stored for an object should be the correct values. data reflects the true and reliable state

A

Accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It contains the complete set of mandatory data items. (invalid, missing, unknown)

A

Complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It means information is readily available whenever it is needed.

A

Timely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is a uniformity of data stored from different locations. Do note that consistent data can still be wrong

A

Consistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information is easy to obtain or gain access to

A

Accessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

information provided should be related/suited to the purpose it is required.

A

Relevant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

information should be short and clear

A

Concise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

when properly managed, it becomes information and then knowledge.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is normally defined as data whose form and content are appropriate for a particular use.

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a combination of instincts, experiences, ideas, rules and procedures that guide actions and decisions.

A

Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the methods in converting data to knowledge

A

Summarizing
Formatting
Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is one of the important tasks for an IT department of any organization since IT applications cannot be done without having the right data.

A

Data Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Managing data is increasingly difficult due to the following factors:

A

-Most organizations require past data to be kept, while new data
need to be

  • Added rapidly. Thus, the amount of data required increases exponentially with time.
  • Most organizations also require an ever-increasing amount of external data.
  • Data in most organizations are not stored centrally. They are collected by many individuals and departments and stored at various locations.
  • Some of the data are not even available in digital format.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It is a process of collecting data from the data source

A

Data Collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the 3 different data source

A

Internal Data Source
External Data Source
Personal Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is located within the organization and normally captured by the organizations information systems and stored in the database or physical files.

A

Internal Data Source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This are data about other organizations, especially our competitors. This data can be obtained from the organizations websites, annual reports and published brochures

A

External Data Source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This are data that belong to individuals within an organization.

A

Personal Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is a collection of data organized to serve one or more application systems

A

Data Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the management of data inside a database is done by a software called ?

A

Data Base Management System (DBMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It acts as an interface between application systems and the database

A

Data Base Management System (DBMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Most popular type of DBMS, data are stored by using two dimensional tables.

A

Relational DBMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Data are organized into a tree-like structure. The data are stored as records which are connected to one another through links.
Heirarchical DBMS
26
Database that subscribes to a model with information represented by objects.
Object Oriented DBMS
27
It is a repository of all of the data needed by the an organization.
Data Warehouse
28
Data are stored by subjects
Data Warehouse
29
The Data are stored by using similar method of coding
Data Warehouse
30
Data are kept for a long time so that they can be used for forecasting and comparisons.
Data Warehouse
31
Data are stored in a multi-dimensional structure so that data can be viewed and analyzed from different perspectives.
Data Warehouse
32
The process of developing this is done by extracting data from all possible data sources
Data Warehouse
33
It is a subset of a Data Warehouse
Data Mart
34
Once the data are stored inside the data warehouse or data marts, they can be analyzed.
Data Analysis
35
It is one of the most important techniques for data analysis that focuses on modelling and knowledge discovery.
Data Mining
36
Data mining techniques can be used to:
Automatically predict trends and behaviors Automatically discover previously unknown patterns.
37
Information is easier to understand if it is represented graphically.
Data Visualization
38
An example of data visualization tool is ________.
Graphical Information System (GIS)
39
It is basically a computer-based system for capturing, checking, integrating, manipulating and displaying digitized maps.
Graphical Information System (GIS)
40
Another type of this is the virtual reality (VR), which enables people to share and interact in the same artificial environment.
Data Visualization
41
It is a technique that can be used for developing a level of understanding of the interaction of a system.
Modelling and Simulation
42
It is a simplified representation of a system in order to promote understanding of the real system.
Model
43
It is the manipulation of a model in such a way that it enables one to perceive the behavior of the system.
Simulation
44
Business Intelligence includes:
Reporting (KPIs, Metrics) Automated Monitoring OLAP Dashboards Scorecards Ad Hoc query
45
A broad category of applications and technologies for gathering, storing, analyzing, sharing and providing access to data to help enterprise users make better business decisions.
Business Intelligence
46
Refer to computer-based techniques used in spotting, digging-out and analyzing business data
Business Intelligence
47
It can generally answer the questions: what happened; how many; how often; where exactly is the problem; what actions are needed.
Business Intelligence
48
It enables data to be analyzed in order to produce reports, predictions and alerts.
Business Intelligence Software Tools
49
These tools can also display information in graphical presentations.
Business Intelligence
50
What are the components of DMS
Metadata Capture Storage Indexing Retrieval Integrationm Distribution Security
51
The description of a document. It may, for example, include the date the document was stored and the identity of the user storing it. The DMS may extract _______ from the document automatically or prompt the user to add metadata.
Meta data
52
Images of documents are normally captured by using scanners. Scanner software normally comes together with Optical Character Recognition (OCR) software, in order to convert digital images into machine readable text.
Capture
53
_____ of the documents often includes management of those same documents; where they are stored, for how long, migration of the documents from a storage media to another.
Storage
54
is the process of extracting important words from the documents' contents. ________ exists mainly to support retrieval.
Indexing
55
______ the electronic documents from the storage.
Retrieval
56
Many DMS attempt to integrate document management directly into other applications, so that users may retrieve existing documents directly from the document management system repository, make changes, and save the changed document back to the repository as a new version, all without leaving the application.
Integration
57
A published document for _________ has to be in a format that cannot be easily altered.
Distribution
58
It is is vital in many document management applications. Compliance requirements for certain documents can be quite complex depending on the type of documents.
Security
59
is a process of identifying, selecting, organizing, disseminating, transferring and applying important information, expertise and experience that are part of the organization
Knowledge Management
60
is a system to help in the process of knowledge management.
Knowledge Management System
61
What are the two types of knowledge
Tactic knowledge Explicity knowledge
62
is a type of knowledge that is not documented, but exists in the form of experiential learning of the organization
Tactic Knowledge
63
is the type of knowledge that has been documented in the form that it can be distributed to others.
Explicit Knowledge
64
What is the Technology to support knowledge management is called?
Knowware
65
is an integrated knowledge management system that combines communication, collaboration and storage technologies into one complete system.
Knowledge management Suite
66
What are the 6 Important Function of KMS?
(a) To help in the process of knowledge creation; (b) To capture new knowledge and to represent it properly; (c) To capture human insights in order to refine available knowledge; (d) To store knowledge in a knowledge repository so that it can be accessed by members of the organisation; (e) To update the knowledge so that it remains relevant and current; (f) To disseminate knowledge so that it can be shared by everybody in the organisation.
67
What are the types of threats (Unintentional Threats)
Human Error Environmental Hazards Computer System Failure Theft of Data/ Equipment Software Attacks Internet Fraud
68
This remain a vulnerable link in the security chain. Human error often plays a crucial role in falling victim to phishing attacks. Phishing relies on tricking individuals into revealing sensitive information such as usernames, passwords, or financial details.
Human Error
69
Lack of cybersecurity education and awareness can lead individuals to inadvertently engage in risky behavior. This includes clicking on suspicious links, downloading malicious files, or unknowingly sharing sensitive information.
Insufficient Training and Awareness
70
Events such as earthquakes, floods, hurricanes, tornadoes, or wildfires can cause physical damage to data centers, servers, and networking equipment. This damage may lead to service disruptions, data loss, and prolonged downtime.
Environmental hazards
71
Power disruptions, whether caused by natural disasters, accidents, or technical failures, can impact the availability and reliability of computer systems. Unexpected power outages may lead to data corruption, loss of transactions, and potential security vulnerabilities.
Power Outages
72
System failures, whether due to hardware malfunctions or software bugs, can lead to downtime and disrupt services. During these periods, organizations may be more susceptible to security threats, as normal security controls and monitoring may be compromised or unavailable.
Computer System Failure
73
Intruders may gain access to computer systems or networks to steal sensitive data. This could involve exploiting vulnerabilities, using stolen credentials, or conducting sophisticated cyber attacks.
Theft of Data/ Equipment
74
Devices such as laptops, smartphones, servers, or external storage devices can be physically stolen. This can result in the loss of both the device and any data stored on it.
Physical Theft
75
cyber attacks, are malicious activities carried out by individuals or groups with the intent to compromise the security, integrity, or availability of computer systems, networks, or data. These attacks exploit vulnerabilities in software applications, operating systems, or other digital components.
Software Attacks
76
Victims are asked to pay a fee upfront with the promise of a larger reward in the future. Common examples include lottery scams and inheritance scams.
Internet Fraud
77
Perpetrators build romantic relationships online and then exploit their victims emotionally and financially.
Romance Scams:
78
Cybercriminals steal and misuse personal information, such as Social Security numbers, credit card details, or bank account information, to commit fraud.
Stolen Personal Information
79
It can be defined as criminal activity involving an information technology infrastructure.
Computer Crimes
80
It can be carried out either by outsiders or insiders.
Computer Crimes
81
What is an an outsider who penetrates a computer system is called
Hacker
82
it is a term used to describe a malicious hacker, who penetrates a computer system in order to commit a crimes.
Cracker
83
What are the types of Attackers
Amatuers Hackers Organized Hackers
84
These people are sometimes called Script Kiddies. They are usually attackers with little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
Amateurs
85
This group of attackers break into computers or networks to gain access. Depending on the intent of the break-in, these attackers are classified as white, gray, or black hats.
Hackers
86
These hackers include organizations of cyber criminals, hacktivists, terrorists, and state-sponsored hackers.
Organized Hackers
87
Some of them are just curious, while others are trying to demonstrate their skills and cause harm. They may be using basic tools, but the results can still be devastating. Script kiddies are individuals with limited technical skills who use pre-written scripts or tools to launch attacks. They often lack in-depth knowledge and may target systems opportunistically.
Amatuers
88
usually groups of professional criminals focused on control, power, and wealth. The criminals are highly sophisticated and organized, and they may even provide cybercrime as a service to other criminals.
Organized Hackers
89
make political statements to create awareness to issues that are important to them.
Hacktivist
90
attackers gather intelligence or commit sabotage on behalf of their government. These attackers are usually highly trained and well-funded, and their attacks are focused on specific goals that are beneficial to their government.
State Sponsored Hackers
91
They are also known as an ethical hacker, is an individual who uses their skills in computer security to identify and address vulnerabilities in computer systems, networks, and applications. White hat hackers work with the permission of the system owner to improve security and protect against potential cyber threats.
White Hat Hackers
92
hackers that exploit vulnerabilities in computer systems, networks, or applications for personal gain, financial motives, or to cause harm. Their activities are typically illegal and unethical, and they may be involved in various cybercrimes.
Black Hat Hackers
93
A gray hat hacker is someone who falls in between the categories of ethical "white hat" hackers and potentially malicious "black hat" hackers. Gray hat hackers may engage in activities that are not strictly authorized, but their intentions are not purely malicious. They might discover and exploit security vulnerabilities without permission, but their goal is often to raise awareness and prompt improvements in cybersecurity rather than causing harm or personal gain.
Grey Hat Hackers
94
Types of Organzied Hackers
Cyber Criminals Hacktivits State sponsored attackers
95
allows the attacker to take control over a device without the user’s knowledge. With that level of access, the attacker can intercept and capture user information before relaying it to its intended destination.
MitM (Man-in-the-middle)
96
This attacks are widely used to steal financial information.
MitM (Man-in-the-middle)
97
Many malware and techniques exist to provide attackers with ______ capabilities
MitM (Man-in-the-middle)
98
It is Short for Malicious Software
Malware
99
is any code that can be used to steal data, bypass access controls, or cause harm to, or compromise a system. designed to harm, exploit, or compromise computer systems, networks, or devices.
Malware
100
It can take various forms, and its objectives range from stealing sensitive information to disrupting the normal operation of a system
Malware
101
What are the symptoms of malware
Increase CPU Usage Decrease CPU Speed Email Sent w/o Consent Unknown File Presence Computer Freezes/ Crashes Files Deleted/ Modified Unknown Process Running Network Connection Probem
102
Some types of malware, such as crypto-mining malware, may cause a significant increase in CPU usage. This occurs when the malware uses the infected system's computational resources to mine cryptocurrency, resulting in higher CPU utilization and slower system performance
Increase CPU Usage
103
Malware or unwanted programs can negatively impact system performance, leading to a decrease in CPU speed. This can manifest as slower response times, delays in executing commands, and overall sluggishness.
Decrease CPU Speed
104
Emails being sent from your account that you did not initiate or are unaware of. Malware may access and manipulate your contacts, adding or modifying entries.
Email Sent w/o Consent
105
Determine where the file came from. Check recent downloads, email attachments, or any external storage devices you may have connected to your computer.
Unknown File Presence
106
is an access attack that attempts to manipulate individuals into performing actions or divulging confidential information.
Social engineering
107
They often rely on people’s willingness to be helpful but also prey on people’s weaknesses.
Social engineers
108
This is when an attacker calls an individual and lies to them in an attempt to gain access to privileged data. An example involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.
Pretexting
109
This is when an attacker quickly follows an authorized person into a secure location.
Tailgating
110
It also known as piggybacking.
Tailgating
111
This is when an attacker requests personal information from a party in exchange for something, like a free gift.
Something for Something (Quid pro quo)
112
Is the process of discovering the password used to protect a wireless network.
Wifi Password Cracking
113
A fraudulent email disguised as being from a legitimate trusted source
Phishing
114
An attack from this results in some sort of interruption of network service
Denial of Service (DoS)
115
Similar to a DoS attack but orginates from multiple, coordinated sources.
Disrupted DoS (DDoS)
116
Increase traffic to malicious sites that may host malware or perform social engineering.
SEO Poinsoning
117
Attacks that use multiple techniques to compromise a target.
Blended attack
118
Wifi passwords cracking can be achieved thru:
Social engineering Brute-force attacks Network sniffing Wi-Fi password cracking Phishing Denial-of-Service (DoS) SEO Poisoning
119
The attacker manipulates a person who knows the password into providing it.
Social engineering
120
The attacker tries several possible passwords in an attempt to guess the password. Brute-force attacks usually involve a word-list file
Brute-force attacks
121
By listening and capturing packets sent on the network, an attacker may be able to discover the password if the password is being sent unencrypted (in plain text).
Network sniffing
122
is the process of discovering the password used to protect a wireless network.
Wi-Fi password cracking
123
is when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source. The message intent is to trick the recipient into installing malware on their device, or into sharing personal or financial information.
Phishing
124
attacks are a type of network attack. A DoS attack results in some sort of interruption of network service to users, devices, or applications.
Denial-of-Service (DoS)
125
The most common goal of this is to increase traffic to malicious sites that may host malware or perform social engineering.
SEO Poisoning
126
To force a malicious site to rank higher in search results, attackers take advantage of popular search terms.
SEO Poisoning
127
SEO poisoning is also known as?
Search Engine Poisoning
128
It is a cyber attack technique that involves manipulating search engine results to drive traffic to malicious websites.
SEO Poisoning
129
is a process where a criminal poses as someone else
Identity Theft
130
Using another’s identity to obtain goods and services
Financial Identity Theft
131
Pretending to be another person when apprehended for a crime
Criminal Identity Theft
132
Using another’s information to assunme his/her identity in daily life
Identity Cloning
133
Using another’s business name to obtain credit.
Business Identity Theft
134
What are the ways to protect your computing device?
Keep Firewall On Use Antivirus and Antispyware Update and Install Patches Encrypt Data Authentication and Authorization Back Up Data Don't Share much on Social Media OAuth
135
acts as a barrier between your computer or network and the internet, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules.
Firewall
136
software helps protect your computer from various types of malicious software, commonly known as malware. Malware includes viruses, worms, trojan horses, ransomware, spyware, adware, and other types of harmful software that can compromise the security and functionality of your computer.
Antivirus and Antispyware
137
fingerprint, palm print, as well as facial or voice recognition
Biometric scan
138
Two Factor Authentication - Physical object - credit card, ATM card, phone, or fob
Authentication and Authorization
139
It converts plain text into unreadable, encoded text, and the original data can only be restored with the proper decryption key.
Encryption
140
Software developers regularly release updates and patches to address vulnerabilities, enhance features, and improve overall performance.
Update and Install Patches
141
is an open standard protocol that allows an end user’s credentials to access third party applications without exposing the user’s password. OAuth acts as the middle man to decide whether to allow end users access to third party applications
Oauth - Open Authorization (OAuth)
142
Ways of protecting Information Resources
System Control Data Control Application Control
143
Physical protection of the computer hardware from being stolen;
System Control
144
Restriction of unauthorized access to computer system;
System Control
145
Establishment of firewall to protect the access to the local network; and
System Control
146
Installation of antivirus software.
System Control
147
Data safety and data security.
Data Control
148
Enforcement of regular backup;
Data Control
149
Plan for disaster recovery;
Data Control
150
Restriction of access to data center.
Data Control
151
are meant to protect specific applications from unauthorized or illegal access.
Application Control