Sie sind auf Seite 1von 4

Disaster Recovery Plans: Detailed procedures for recovering from systems related disasters

Protocol: Defines the procedures that different computers follow when they transmit and receive
data

Network: A network is a group of computers and associated peripheral devices connected by a


communication channel capable of sharing information and other resources

Data Warehouse: A single repository of database information integrated from multiple large
databases and other information sources is called a Data Warehouse

Datamart: A data warehouse that is limited in scope. It contains selected information of the
company’s business, for example, finance data, inventory data

Telecommunications: Refers to the transmission of all types of information including digital data,
voice, fax, sound and video from one location to another over some type of network

PAN (Protected Automatic Network):

Deterministic systems

Stochastic systems

Intranet and Extranet

Website: Webpages are formatted using hypertext and have embedded links that connect
documents to one another. A website is a collection of webpages linked to a home page

Portal: Portals are defined as gateways to the web and are those sites which users set as their home
page. Eg: Google, Bing, Yahoo etc.

Authentication: Authentication refers to the ability to know that a person is who he or she claims to
be

Podcasts:

GPS:

GIS:

VAN (Value Added Network):

PDM: Product data management is the business function often within product lifecycle management
that is responsible for the management and publication of product data.

PLM: Product lifecycle management (PLM) is an information management system that can integrate
data, processes, business systems and, ultimately, people in an extended enterprise. PLM software
allows you to manage this information throughout the entire lifecycle of a product efficiently and
cost-effectively from ideation, design and manufacture through service and disposal.

Second life

Click Stream Data

Warehouse Management system:

EAI (Enterprise Application Integration): Enterprise application integration is the use of software and
computer systems' architectural principles to integrate a set of enterprise computer applications.
Database Schema

Synchronised Database (DSR)

Virtual Database

Virus: A rogue software program that attaches itself to other software programs or data files in
order to be executed, usually without user knowledge or permission

Worms: Independent computer programs that copy themselves to from one computer to another
over a network; rely less on human behaviour

Trojan Horse: This is something that appears to be benign but then does something other than
expected. Not a virus but a way for viruses to be introduced into a computer system

Malware: Malicious Software

Fuzzy Logic: It is a rule based technology that that can prevent imprecision by creating rules that use
approximate or subjective values. It can describe a particular phenomenon or process linguistically
and then represent that description in a small number of flexible rules. Used to create software
systems that use tacit knowledge where there is linguistic ambiguity

IPS (Intrusion Detection system): This features full time monitoring tools placed at the most
vulnerable points or hotspots of corporate networks to detect and deter intruders continuallyAn

Intrusion Prevention System (IPS): is a network security/threat prevention technology that


examines network traffic flows to detect and prevent vulnerability exploits.IDS (Intrusion Detection
System)

Explicit Knowledge: Knowledge that has been documented

Tacit Knowledge: Knowledge residing in the minds of employees that has not yet been documented

OLTP: Online transaction processing is information systems that facilitate and manage transaction-
oriented applications, typically for data entry and retrieval transaction processing

OLAP (Online Analytical Processing): Uses multidimensional data analysis that allows users to view
the same data in different ways using multiple dimensions.

DSS

Artificial Intelligence: Consists of computer based systems that attempt to emulate human
behaviour like learning languages, accomplish physical tasks etc.

Expert Systems: These are an intelligent technique for capturing tacit knowledge in a very specific
and limited domain of human expertise. These systems capture the knowledge of skilled employees
in the form of a set of rules in a software system that can be used by others in the organization

Machine Learning: It is the study of how computer programs can improve the their performance
without explicit programming.

Neural Networks: These are used for solving complex, poorly understood problems for which large
amounts of data have been collected. They find patterns and relationships in massive amounts of
data that would be too complicated for humans to analyze
EDI – Electronic Data Interchange: This enables computer-to-computer exchange between two
organizations of standard transactions such as invoices, bills etc. These are automatically transmitted
eliminating printing and handling of paper.

FOS (free and open software)

Non-repudiation

Phishing: Involves setting up fake websites or sending email messages that look like those of
legitimate businesses to ask users for confidential information

Pharming: Pharming redirects users to a bogus webpage, even when the individual types the correct
web page address into his or her browser.

Click Fraud: Occurs when an individual or computer program fraudulently clicks on an online ad
without any intention of learning about the advertiser or making a purchase

Evil Twins: These are wireless networks that pretend to offer trustworthy WiFi connections over the
internet such as those in airports.

Dumpster diving: a popular form of modern salvaging of waste in large commercial, residential,
industrial and construction containers to find items that have been discarded by their owners, but
that may prove useful to the picker. It is not confined to dumpsters specifically, and may cover
standard household waste containers, landfills or small dumps.

Sniffing: Eavesdropping program that monitors information traveling over a network.

Rootkit

Keylogger: Record every keystroke made on a computer to steal serial numbers for software

DOS (Denial Of service): Hackers flood a network server or Web server with many thousands of false
communications or requests for services to crash the network

DDOS (Distributed Denial of Service): Uses numerous computers to inundate and overwhelm the
network from numerous launch points

Botnet: Perpetrators of DOS use ‘zombie’ PCs affected with malicious software without their owners’
knowledge and organized into a Botnet. They are created by using bot malware. The infected
computer then becomes a slave, helping launch into DOS

War Driving: Eavesdroppers drive by buildings or parks outside and try to intercept wireless network
traffic

Spoofing: Hackers misrepresent themselves by using fake email addresses or masquerading as


someone else; may also involve redirecting a web link to an address different from the intended one

Firewall: A firewall is a combination of hardware and software that control the flow of incoming and
outgoing network traffic. It prevents unauthorized users from accessing private networks

Types of Models:

 Narrative
 Physical
 Schematic
 Mathematical
Attacks:

 Interruption
 Interception
 Modification
 Fabrication

Cryptography:

 Encryption
 Plaintext
 Cyphertext
 Algorithm

Data Mining: Provides insights into corporate data that cannot be obtained with OLAP by finding
hidden patterns and relationships in large databases and inferring rules from them to predict future
behaviour

Data cleansing: Also known as data scrubbing, consists of activities for detecting and correcting data
in a database that are incorrect

Das könnte Ihnen auch gefallen