Create an account
denial of service attack
an assault which disrupts computer access to an internet service such as the web or email
a program or set of instructions in a program that allows users to bypass security controls when accessing a computer resource
a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
security system consisting of hardware and/or software that prevents unauthorized intrusion
certificate authority (CA)
authorized person or company that issues and verifies digital certificates
secure sockets layer (SSL)
provides encryption of all data that passes between client and internet server
information system (IS)
hardware, software, data, people, and procedures that work together to produce quality information
determine exact nature of problem or improvement and whether it is worth pursuing
computer-aided software engineering (CASE)
software tools designed to support activities of system development cycle
instructions made up of symbolic instructions codes, meaningful abbreviations and codes
programmer writes instructions that tell computer what to accomplish and how to do it
developed by sun microssystems; used just in time (JIT) compiler to convert bytecode into machine-dependent code
includes all elements of C, plus additional features for working with object oriented concepts; used to develop database and web applications
object oriented programming language based on C++; accepted as a stranded for web applications and XML-based web services; Microsoft intermediate language (MSIL)
the programmer writes english like instructions or interacts with a visual environment to retrieve data from files or a database
program development tools
user-friendly programs designed to assist both programmers and users in creating programs
RPG (report program generator)
nonprocedural language used for generating reports, accessing data, and updating data
online security service
website that evaluates your computer to check for internet and e-mail vulnerabilities
programs that act without a users knowledge and deliberately alter the computer's operations
antivirus program records information such as file size and file creation date in a separate inoculation file
a group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks
server outside the company's network that controls which communications pass into the company's network
uninterruptible power supply (UPS)
a device that contains surge protection circuits and one or more batteries that can provide power during a temporary permanent loss of power
refers to the right of individuals and companies to deny or restrict the collect and use of information about them
is a scam in which a perpetrator sends an official looking e-mails message that attempts to obtain your personal financial information
a scam, where ta perpetrator attempts to obtain your personal and financial information, except they do so via spoofing
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others
system development cycle
a set of activities used to build an information system, the length of each activity varies from one system to the next
process of planning, scheduling, and then controlling the activities during the system development cycle
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together