23 terms

BM test 2

STUDY
PLAY

Terms in this set (...)

Social engineering security threat
Using "people skills" to trick others into revealing private information
Phishing
Sending fraudulent e-mails that seem to come from legitimate sources
Pharming
Hacking a legitimate DNS server and disguise itself
Biometric security measures
Use a physiological element unique to a person
Access controls
passwords
Terminal resource security measures
software that erases the screen and signs the user off
URL
uniform resource locators
HTML
hypertext markup language. Language used to create web pages
Hypermedia
Documents can include embedded references to audio, images or videos
Hypertext
embedded references in hypermedia
The beginning of the Internet
1970's
business
activities a company performs for selling and buying products and services
e commerce
buying and selling goods and services over the internet
e commerce vs. traditional commerce
- builds flexibility that networkd offer and the internet
Merchant
transfers the old retail model to the internet (walmart)
Brokerage
brings sellers and buyers together on a single website and collects commissions on transactions (auction ebay)
Advertising
By offering contents for free, charges other companies for advertisements (google)
Infomediary
collects information on consumers and businesses and then sells it to other companies (bizrate)
Subscription
sell digital stuff by subscription (wall street journal)
Search engine optimization
is a method for improving the volume or quality of traffic to a Web site. Optimizing a Web site involves editing a site's content and HTML code to increase its relevance to specific keywords.
plaintext
is your real message
cipertext
the hidden text in scrambled form
B2b
business to business