Term
|
Definition
|
|
Term
Rationalization of change |
|
Definition
streamlining of operating processes |
|
|
Term
Business process reengineering |
|
Definition
Radical design of the business process |
|
|
Term
|
Definition
Radical reconceptualization |
|
|
Term
|
Definition
development method used by most org. today for large complex systems |
|
|
Term
|
Definition
sequence of steps in the SDLC with cycles returned to previous stops, |
|
|
Term
|
Definition
IS professionals who specialize in analyzing and designing info systems |
|
|
Term
|
Definition
IS professionals who modify existing computer programs or write new computer programs to satisfy user requirements |
|
|
Term
|
Definition
experts in a certain type of technology, such as databases or telecommunications |
|
|
Term
|
Definition
Define the system to be developed. Set the project scope, the plan should include tasks resources and timeframes |
|
|
Term
|
Definition
written definition of the project scope …usually no longer then a paragraph |
|
|
Term
|
Definition
defines what when and who questions of system development including all acitivities individuals and resources needed for the activities and the time required to complete each activity |
|
|
Term
|
Definition
represent the key dates for which you need a certain group of activities performed |
|
|
Term
|
Definition
is an individual who is an expert in planning and management, he defines the project plan and tracks it to ensure all milestones are met in time |
|
|
Term
|
Definition
study to determine the probability of success of proposed system development project and asses the projects Technical, Economic and Behavioral feasibility |
|
|
Term
|
Definition
Examination of the business problem the org. plans to solve with info. systems Requirements definition document – End users and IT work together to create a document that prioritizes the business requirements (requires approval by knowledge workers) (can include strengths and weakness of old system…Necessary functions for the new system, and user info requirements for the new systems. |
|
|
Term
|
Definition
technical blueprint of how proposed system will work and define the tech architecture…(Outputs, Inputs, Interfaces, hardware software, databases, telecommunications, personnel and procedures.) |
|
|
Term
|
Definition
The translation of the design specifications into comp. code which becomes the actual system |
|
|
Term
|
Definition
Checks to see if the comp code will produce the expected and desired results Under certain conditions (for Syntax errors - spelling commas, Logic errors – program runs with incorrect output, ) |
|
|
Term
|
Definition
converting from the old system to the new |
|
|
Term
|
Definition
monitor and support new system to ensure it continues to meet business goals. Help desk for support, (add new functioning, updating for changes and debugging) |
|
|
Term
|
Definition
process of building experimental system quickly and inexpensively for demonstration and evaluation. |
|
|
Term
|
Definition
IT Specialists with in organization will develop the system |
|
|
Term
|
Definition
develop system by end users with little or no formal assistance from specialists |
|
|
Term
|
Definition
the delegation of specific work to a third party for a specific length of time, specific cost, specified level of service |
|
|
Term
|
Definition
The principles and standards that guide our behavior toward other people |
|
|
Term
|
Definition
intangible creative work that is embodied in physical form |
|
|
Term
|
Definition
you may use copyrighted material in certain situations |
|
|
Term
|
Definition
protection afforded an expression of an idea |
|
|
Term
|
Definition
unauthorized use duplication distribution or sale of copyrighted software |
|
|
Term
|
Definition
Taking a shit while coppin some brain ya diggggg |
|
|
Term
|
Definition
software manufactured to look like the real thing and sold like it is the real thing |
|
|
Term
|
Definition
the right to be left alone when you want to be, control of your own personal possessions and not to be observed w/o your consent. |
|
|
Term
|
Definition
program that records every keystroke and mouse click |
|
|
Term
|
Definition
a small record deposited on your hard disk by a web site containing info about you and your web activities |
|
|
Term
|
Definition
software to generate ads that installs itself on your comp when you download another program from the web |
|
|
Term
|
Definition
software you don’t want hidden inside what you do |
|
|
Term
|
Definition
comes hidden in free downloadable software and tracks online movements, also mines the info stored in computer, or uses cpu and storage for some tasks you know nothing about. |
|
|
Term
|
Definition
Consists of one line of info for every visitor to a site and is stored on a web server |
|
|
Term
|
Definition
records info about you during a web surfing session such as what web sites you visited, how long, what adds you viewed, what you bought |
|
|
Term
|
Definition
anonymous web browsing – hides your identity from web sited you visit |
|
|
Term
|
Definition
Bustin a monster load on the chin so it looks like santa ya digggg |
|
|
Term
|
Definition
HIPPA, limit release and use of health info, right to access your own records, specifies circumstances of access and disclosure if the recipients signs protection agreement The Privacy act- restricts info government can collect Freedom of information act – citizens have the right to access info the govt has abt them Bork Bill – video privacy act prohibits use of video rental info on customers for any thing else other then marketing directly to customers. |
|
|
Term
|
Definition
Copying the info stored on a computer |
|
|
Term
|
Definition
the use of physical characteristics (finger print, retina scan ) to prove identification |
|
|
Term
|
Definition
the study of secrete (crypto) writing (graphy) |
|
|
Term
|
Definition
scrambling/concealing a message |
|
|
Term
|
Definition
process of transforming cipher text message back to plain text message |
|
|
Term
|
Definition
method used to encrypt a message |
|
|
Term
|
Definition
random secrete value placed with the cipher to encrypt or decrypt messages |
|
|
Term
|
Definition
extensible hypertext markup language – xtml and xml hybrid. All tags must be closed, all tags are lowercase (except for DOCTYPE tag) , all tag attributes are quoted |
|
|
Term
|
Definition
to help enhance law enforcement investigation tools (authority to use wire taps for terrorism and fraud) |
|
|
Term
Dept of Homeland Security |
|
Definition
monitors the internet for “State—sponsored information warfare” |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Computer Fraud and Abuse Act |
|
Definition
– passed by congress to reduce hacking |
|
|
Term
Digital Millennium Copyright Act |
|
Definition
world intellectual property organization (controls copyrights on Digital Rights) |
|
|
Term
Grammm-Leach-Bliley Act (glb) |
|
Definition
banks can not offer investing, commercial banking or insurance services. Also investment banks can merge. SAFEGAURDS RULE (security of info plan) PRETEXTING PROTECTION (social engineering when some one tries to gain unauthorized access to another persons personal info) Also defines consumer/client privacy rights. Consumer vs. Customer (customer has ongoing relationship beyond simple cash transaction) |
|
|
Term
|
Definition
|
|
Term
|
Definition
examine media for evidence |
|
|
Term
|
Definition
review of software for malicious signatures |
|
|
Term
|
Definition
scrutinize network traffic and logs to identify and locate |
|
|
Term
|
Definition
the collection, authentication, preservation, and examination of electronic info for presentation in court ( 2 phases 1-collection, authenticating and preserving electronic evidence, 2-analyzing the findings) |
|
|
Term
|
Definition
hard disk removed w/o turning on comp, hardware used to ensure nothing is written on drive, Forensic Image Copy – an exact copy of all stored info |
|
|
Term
|
Definition
– make sure no evidence was planted or destroyed. (Use the MD5 hash value – unique for each storage medium at a specific point in time) |
|
|
Term
|
Definition
Interpretation of info uncovered. Recovered info is put in context. Can pinpoint location on disk, creator &date created |
|
|
Term
|
Definition
space between the end of the file and the end of the cluster |
|
|
Term
|
Definition
set of clusters that has been marked as available to store info but has not yet received any |
|
|
Term
|
Definition
writing or hidden writing, can be hidden in text or image files S-Tools, DPEnvelope, Jpgx, tte. The mechanism to hide relatively small amount of data in other data file that are significantly larger |
|
|
Term
|
Definition
Rate at which one channel caries info from one computer to another |
|
|
Term
|
Definition
volume or capacity of data a channel can carry |
|
|
Term
Transmission Mode way by wich the data is transmited |
|
Definition
Asynchronous (one bit at a time) Synchronous (blocks of bytes) |
|
|
Term
|
Definition
Three directions for transmitting data include simplex, half duplex and duplex |
|
|
Term
|
Definition
info travels as analog or digital signals |
|
|
Term
|
Definition
the paths, or physical channels, in a network over which information travels. |
|
|
Term
Wired communications media |
|
Definition
transmit information over a closed, connected path. Twisted pair cable(telephone Ethernet) Coaxial Cable(Cable TV) Fiberoptic (DWDM) |
|
|
Term
Wireless communications media |
|
Definition
transmit information through the air Feasibility study, project scope, information requirements |
|
|
Term
|
Definition
a device that connects multiple computers into a network |
|
|
Term
|
Definition
a device that connects multiple computers into a network in which multiple communications links can be in operation simultaneously |
|
|
Term
|
Definition
a device that acts as a smart hub connecting computers into a network, and it also separates your network from any other network it’s connected to |
|
|
Term
|
Definition
A network configuration in which all computers on the network are connected through a single circuit, such as twisted-pair cable. Messages are transmitted to all computers on the network, although only the targeted device responds to the message. |
|
|
Term
|
Definition
A network configuration in which computers are arranged in the form of a ring using twisted-wire, coaxial cable, or fiber optics. Messages are transmitted in one direction to all devices between the sending node and the receiving node |
|
|
Term
|
Definition
A topology in which a central host computer receives all messages and then forwards the message to the appropriate computer on the network. |
|
|
Term
|
Definition
covers a limited geographic distance, such as an office, building, or a group of buildings in close proximity to each other. |
|
|
Term
Municipal area network (MAN) |
|
Definition
covers a metropolitan area |
|
|
Term
|
Definition
covers a large geographic distances, such as a state, a country, or even the entire world. |
|
|