Questions |
Answers |
Providing IT services, applications, and data using dynamically scalable storage locations possibly residing remotely, so users do not need to consider the physical location of the storage that supports their needs. |
cloud computing |
The set of legal and ethical methods for collecting, developing, analyzing, and disseminating actionable information pertaining to competitors, suppliers, customers, the organization itself, and the business environment that can affect a company’s plans, |
competitive intelligence |
A form of protection provided by law to the authors of original works of literary, dramatic, musical, artistic, and certain other intellectual efforts. This protection is available to both published and unpublished works. |
copyright |
Involves criminal activity carried out via the internet. |
cybercrime |
The process of protecting data, networks, and computing power that make up computer systems. |
cyber/computer security |
A euphemism for online interactions, and describes the Internet universe and its various computer networks. |
cyberspace |
Use of the Internet for terrorist activities, including large-scale acts of deliberate disruption of computer networks. |
cyberterrorism |
Uses the Internet to infiltrate or attack an enemy’s computer network. |
cyberwarfare |
One of the most frequent attacks seen on the Internet is an effort to flood computer systems with emails, logons, requests, or other types of intrusions. |
denial of service |
Secretly getting access to another person or organization’s computer network in order to steal information, cause damage, or disrupt communication. |
hacking |
The theft of someone else’s personal information—name, credit card number, or other identifying information—to obtain money, credit, or other things of value. |
identity theft |
The theft of information by legal or illegal means. It entails obtaining confidential information from other companies such as strategic plans or pricing policies, with the intent to use the information to gain a competitive edge in the marketplace. |
industrial espionage |
A global system of interconnected computer networks, sensors, actuators, and devices all using the Internet protocol that enables communication among “intelligent” physical objects. |
Internet of things (IoT) |
Stands for malicious software—software programs that are designed to damage or do other unwanted actions to a computer system. |
malware |
A type of malware that once installed on a victim’s computer via the Internet both locks the device and also generates a pop-up window, Web page, or email warning and demands payment be made in order for the system to be unlocked. |
ransomware |
Processes, devices, or something else that is used continuously in the operation of the business. |
trade secrets |
A destructive program that masquerades as a legitimate file or application to gain entry to a computer. |
Trojan horse |
Internet-based communities in which users interact with each other online on websites such as Facebook, Twitter, LinkedIn, Instagram, YouTube, and Pinterest. |
social media |
Collections of software tools that enable administrators to access a computer or computer network. |
rootkits |
An ad hoc network that wirelessly connects computers and devices directly to each other without passing through any central authority or organization. |
mesh network |