- - ANS-CH 5
invading someone else's computer, usually for personal gain or just for the satisfaction of
invading someone else's computer - ANS-Hacking
social-engineering attack that can use e-mail sent to the recipient under false pretense to steal
confidential information from the target. - ANS-phishing
Bring your own device.
- A policy allowing employees to connect personally owned devices, such as tablets and
smartphones, to a company network.
- Data security is often a concern with BYOD policies and organizations often use VLANs to
isolate mobile devices. - ANS-BYOD
software that is intended to damage or disable computers and computer systems. -
ANS-malware
A type of malware that prevents a user's device from properly and fully functioning until a fee is
paid. - ANS-ransomware
Profit motivated attackers operate "under the radar" and continue to steal data, unlike hackers
with personal agendas that carry out high-profile attacks to gain recognition - ANS-advanced
persistent threats (APT)
work or invention that is a result of creativity that has commercial value, including copyrighted
property such as a blueprint manuscript or design, and is protected by law from unauthorized
use by others
- ex: trade secrets,
- can represent more than 80% of a company's value
- more difficult to protect IP due to corporate moles, insiders, and accessible anonymity of the
internet - ANS-intellectual property (IP)
a type of malware that appears harmless, but is malicious. Requires human interaction
- ex. clicking a link or download - ANS-trojan horse
a type of malware that attaches itself to programs, files, and links, which can affect users that
either click the links or interact with any files. - ANS-viruses
, can independently replicate and spread across networks or systems without having to attach
themselves to files or having human intervention. - ANS-worms
Risk management process
- maintaining business functions or restoring them quickly when there is a major disruption. The
plan covers business processes, assets, human resources, business partners, and more.
- Meant to keep the business running after a disaster occurs. - ANS-business continuity plan
*know definition!
EOQ: economic order quantity
MRP: material resource planning
JIT: just in time
Consignment stock: inventory that a vendor sends to a retailer for sale
Reorder points: specific level at which inventory needs to be replenished - ANS-supply chain
management considers...
planning, sourcing, manufacturing, delivery, returns - ANS-supply chain management phases (5)
Software or hardware device that controls access to a private network from a public network by
analyzing data packets entering or exiting it - ANS-firewall
an objective measure for comparing competitive suppliers. helps monitor quality, cost, delivery
and innovation of goods and services purchased from them. - ANS-supplier metrics
the process of granting or denying access to specific data or resources based on a set of
permissions or rules - ANS-data authorization
A process used to verify data integrity e.g., verification that data received are identical to data
sent, or verification that a program is not infected by a virus. - ANS-data authentication
- - ANS-CH 6
refers to the tools, algorithms, and methodologies used to retrieve specific information or data
from a vast pool of resources, such as databases, websites, documents, or other repositories. -
ANS-search technology
1. enterprise search
2. recommendation engines
3. SEM
4. Web search - ANS-How does search technology impact businesses?
AI systems that help people discover things they may like but are unlikely to discover on their
own.
- collaborative filtering: recommendations based on users' similarity to other people