a set of rules governing the exchange or transmission of data between devices.
list of all the requests for individual files that people have requested from a Web site.
Restrictions placed on records so that only certain people or positions within your agency can access them
All accidents arise from human error in one form or another.
A form of Encryption where keys come in pairs.
a record of the changes that have been made to a database or file.
a copy of a file or other item of data made in case the original is lost or damaged
physical barrier to stop unauthorized people gaining access to hardware and software
when a device or hardware component is lost by accident
The process of backing up all data is pivotal to a successful disaster recovery plan
protect (a network or system) from unauthorized access with a _ _ _ _ _ _ _ _
a set of rules about how the data is communicated by a wired network
process of encoding information
process of confirming the correctness of the claimed identity
approval, permission, or empowerment for someone or something to do something
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one
encrypted form of the message being sent
stripping one llayer's headers and passing the rest of the packet up to next higher layer
TCP/IP protocol specifying the transfer of text or binary files across the network
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1)
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse)
prove that a user sent a message and the message has not been altered
sequence of eight bits
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
gaining unauthorized logical access to sensitive data by circumventing a system's protections
type of input validation attack where SQL code is inserted into application queries to manipulate the database
basic communication language or "protocol" of the Internet
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program
computer resources must be ready for use by authorized users when needed
keep information protected from unauthorized disclosure or viewing
process of converting data into a secret code for transmission over a public network
separate two or more parts of a network to control data exchange between each other
prevent data from being modified or tampered with
rate at which a processor can complete a processing cycle
data sent to your computer by a Web server that records your actions on a certain Web site
code made up of numbers separated by three dots that identifies a particular computer on the Internet
computer network limited to a small area such as an office building, university, or even a residential home
main circuit board of your computer and is also known as the mainboard or logic board
each motherboard has a collection of chips and controllers known as _____
external device that provides input and output for the computer (e.g. keyboard, mouse)
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads
protocol used for sending e-mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers
any software program in which advertising banners are displayed while the program is running.
designed to detect and destroy computer viruses.
an attempt by hackers to damage or destroy a computer network or system.
a method, often secret, of bypassing normal authentication in a product
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
are small files that Web sites put on your computer hard disk drive when you first visit
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
someone who seeks and exploits weaknesses in a computer system or computer network.
global system of interconnected computer networks that use the Internet protocol suite
a local or restricted communications network, especially a private network created using World Wide Web software.
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
the activity of defrauding an online account holder of financial information by posing as a legitimate company.
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
any malicious computer program which is used to hack into a computer by misleading users of its true intent
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
a standalone malware computer program that replicates itself in order to spread to other computers.
A device for connecting multiple network devices and multiple segments.
A private data resource using the same technology as the internet.
A set of rules or standards that control communication between devices.
Automatic switching to a backup computer system in the event of system failure.
Software that provides services to a client, or the hardware that is running it.
Software or hardware that requests services from a server.
A device for connecting multiple network devices in one segment.
The purpose of scrambling data so it can be sent securely over networks.
Device that forwards data packets to the appropriate parts of a computer network.
Device which converts between digital and analogue signals, e.g. telephone line to computer.
Formatted unit of data sent across networks.
The amount of data that can be transferred from one point to another in a given time period.
Device that connects different network segments and media.
A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data.
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
The combination of typeface and other qualities, such as size, pitch, and spacing.
A word or group of words that act as a way to cross reference to other documents or files on the computer.
A device that feeds data into a computer, such as a keyboard or mouse.
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape.
Usually comprises the display device, circuitry, casing, and power supply.
Sending an email, posting photos on a social media site and using your webcam.
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways.
Usually consists of eight bits.
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials.
copy (data) from one computer system to another, typically over the Internet.
The collection of physical parts of a computer system.
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
A measure of the amount of computational work that a computer system performs.
an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data
any part of your computer that has a physical structure, such as the keyboard or mouse.
any set of instructions that tells the hardware what to do and how to do it
the metal and plastic box that contains the main components
one of the main ways to communicate with a computer.
another important tool for communicating with computers. Commonly known as a pointing device.
is used to print documents, photos, and anything else that appears on your screen.
is the computer's main circuit board
your system's short-term memory
where your software, documents, and other files are stored
is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language
What id a shorter term for Wireless Internet Connection
is a type of software that allows you to perform specific tasks
llows you to write a letter, design a flyer, and create many other types of documents
the tool you use to access the Internet
any type of software that is designed to damage your computer or gain unauthorized access to your personal information
measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second.
When you save a file, the data is written to the hard drive, which acts as
is responsible for what you see on the monitor
also called an audio card—is responsible for what you hear in the speakers or headphones
The opening page of a website.
A computer language used to create web pages.
A file format for compressing pictures
A link from a hypertext file or document to another location or file, activated by clicking on a highlighted word or image on the screen.
The ability to use technology to find, organize, and evaluate information.
A group of networked computers that share a common address (.edu, .com).
The process of converting data into code.
A security system that protects a network.
A way to narrow search results by using the operators AND, OR, & NOT.
A temporary storage place for quick retrieval of frequently used data.
A small text file stored in a computer’s hard drive by a website.
An organized collection of information that is searchable.
To practice appropriate and responsible behavior when using technology
The text field in a web browser where an URL is displayed or typed.
The amount of data that can be sent through a connection at one time.
To save the URL of a webpage for easy access in the future.
Instructions you input for a computer to follow.
The action of writing CODE or instructions for the computer to follow.
An unit of memory (8 binary digits represent a character).
Central Processing Unit- The brain of the computer.
A program that searches for items in a database or sites on the WWW.
Uniform Resource Locator- The address of a resource on the WWW.
A program used to navigate the WWW.
The global system of interconnected computer networks that link billions of devices.
A set of computers connected together for the purpose of sharing resources.
Hyper Text Transfer Protocol- the set of rules for transferring files on the World Wide Web.
What is it called when computers and other devices that are connected to share hardware, software, and data?
A real time, face to face meeting between individuals not in the physically in the same place is called?
A phone, such as a cellular or satellite phone, that uses a wireless network.
The act of working from a remote location bu using computers and networking technology.
The use of networking technology to provide medical information and services
A network that uses a central device connected directly to several other devices
In a client-server network, a computer that is dedicated to processing client requests.
A location that provides wireless Internet access.
A network in which computers and other devices are connected to the network via physical cables
A network in which computers and other devices are connected without physical cables
A network that uses a central cable to which all network devices connect.
In a client server network, a computer or other device that requests and uses network resources.
To retrieve files from a server
to transfer files to a server
a private network that is set up similarly to the internet and is accesses via a Web browser
The amount of data that can be transferred, such as via a bus or over a networking medium, in a given time period.
An intranet that is at least partially accessible to authorized outsiders.
The amount of data that is transferred under real life conditions.
A method of transmitting data in which data is sent out to all nodes on a network and is retrieved only by the intended recipient.
A networking standard for very short-range wireless connections
a list of entities that are blocked or denied access/privilege
the unauthorized access and disclosure of sensitive information released outside of an unauthorized organization
specialized techniques for gathering, retaining and analyzing data as evidence for investigations
an act of pretending to be from a reputable organization to deceive individuals into providing sensitive information
a list of organizations that are considered trustworthy or allowed access/privilege
ensuring information with sensitive data remain hidden, inaccessible to unauthorized users.
a type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker.
a type of digital currency
The practice and process designed to help protect one or an organizations networks, computers, programs and data from unauthorized access.
Medical history information, laboratory results, insurance information and other healthcare data an entity collects to identify an individual
The name of the leader who you would report security incidents to
The name of the leader who you would report privacy incidents to
The name of our Chief Information Officer who oversees the IT Infrastructures at Quartz
Duo-Security is considered what type of authentication when logging in remotely?
Name of the form used to submit requests for: Hardware/Software, Security, Telecom or Facilities (Badging only)
To report a compliance incident, who do you contact?
Quartz policy and procedure S014 outlines what type of policy?
The process of taking an unencrypted message or data and applying a mathematical function to it, to produce an encrypted message
What process do you need to go through for approval before files can be exchanged externally?
You are required to wear this item at all times while on Company premises
When a person tags along with another person who is authorized to gain entry pass a certain checkpoint
Something or someone that may result in harm to asset
Probability of a threat exploiting a vulnerability
A weakness that threatens the confidentiality, integrity, or availability (CIA) of an asset
Tool or technique that takes advantage of a vulnerability
Process of identifying, assessing, and reducing risk to an acceptable level
Security feature designed to restrict who has access to a network, IS, or data.
The process of generating, recording, and reviewing a chronological record of system events to determine their accuracy
Transforming data into scrambled code to protect it from being understood by unauthorized users
Software or hardware device that controls access to a private network from a public network (Internet) by analyzing data packets entering or exiting it
The ability of an IS to continue to operate when a failure occurs, but usually for a limited time or at a reduced level