Shared Flashcard Set

Details

Systems Analysis and Design
Chp 12
58
Computer Networking
Undergraduate 4
04/25/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
Database (DB)
Definition
an integrated collection of stored data that is centrally managed and controlled
Term
Database management (DBMS)
Definition
A system software component that manages and controls one or more databases
Term
physical data store
Definition
databases component that stores the raw bits and bytes of data
Term
Schema
Definition
Database component that contains descriptive information about the data stored in the physical data store
Term
relational database management system (RDMS)
Definition
a DBMS that organizes data in tables or relations
Term
Table
Definition
A two dimensional data structure of columns and rows
Term
Row
Definition
one horizontal group of data attribute values in a table
Term
attribute
Definition
one vertical group of data values in a table
Term
Key
Definition
An attribute or set of attributes, the values of which occur only in all the rows of the table
Term
Primary key
Definition
the key chosen by a database designer to represent relationship among rows in different tables
Term
foreign key
Definition
an attribute that duplicates the primary key of a different or foreign table
Term
Referential integrity
Definition
a consistent state among foriegn key and primary key values
Term
Referential integrity constraint
Definition
a constraint stored in the schema that the dbms uses to automatically enforce referental integrity
Term
Normalization
Definition
a formal technique for evaluating and improving the quality of a relational database schema
Term
First normal form 1NF
Definition
restriction that all rows of a table must contain the same number of columns
Term
Functional dependency
Definition
a one to one association between the value of two attributes
Term
Second normal form 2nf
Definition
restriction that a table is in 1nf and that each non key attribute is functionally dependant on the entire primary key
Term
Third normal form 3NF
Definition
restriction that a table is in 2NF and that no non key attribute is functionally dependant on any other non key attribute
Term
Primitive data type
Definition
A data type supported directly by computer hardware or programming language
Term
Complex data type
Definition
combination of or extensions to primitive data types that are supported by programming language operating systems and DBMS
Term
Single database server architecture
Definition
one or more databases are hosted by a single DBMS running on a single server
Term
Replicated Database server architecture
Definition
complete database copies are hosted b cooperating DBMS running on multiple servers
Term
Partitioned Database Server architecture
Definition
multiple distributed database servers are used and the database schema is partitioned with some content on only one server and some content copied on all servers
Term
Cloud database server architecture
Definition
user of a cloud computing service provider to provide some or all database services
Term
Database synchronization
Definition
updating one database copy with changes made to other database copies
Term
Input controls
Definition
a control that prevents invalid or erroneous data from entering the system
Term
Value limit control
Definition
a control that checks numeric data input to ensure that the value is reasonable
Term
Completeness control
Definition
a control that ensures that all required data value describing an object or transaction are present
Term
Data validation control
Definition
a control that ensures that numeric fields that contain codes or identifiers are correct
Term
Field combination control
Definition
a control that reviews combinations of data inputs to ensure that the correct data are entered
Term
Access Control
Definition
A control that restricts which persons or programs can add modify or view information resources
Term
transaction logging
Definition
a technique by which any update to the database is logged with such audit information as user ID date time input data and type of update
Term
Complex update control
Definition
a control that prevents errors that can occur when multiple programs try to update the same data at the same time or when recording a single transaction requires multiple related database updates
Term
Output control
Definition
a control that ensures that output arrives at the proper destination and is accurate current and complete
Term
Fraud triangle
Definition
model of fraud that states that opportunity motivation and rationalization must all exist for a fraud to occur
Term
Security control
Definition
a control that protects the assets of an organization from all threats with a primary focus on external threats
Term
Authentication
Definition
the process of identifying users who request access to sensitive resources
Term
Multifactor authentication
Definition
using multiple authentication methods for increased reliability
Term
access control list
Definition
list attached or linked to a specific resource that describes uses or user groups and the nature of premitted access
Term
Authorization
Definition
the process of allowing or restricting a specific authenticated users access to a specific resources bases on an access control list
Term
unathorized user
Definition
a person who isnt allowed access to any part or functions of the system
Term
registered user
Definition
a person who is authorizes to access the system
Term
privileged user
Definition
a person who has access to the source code executable program and database structure of the system
Term
encryption
Definition
the process of altering data so unauthroized users cant view them
Term
decryption
Definition
the process of converting encrypted data back to their original state
Term
encryption algorithm
Definition
a complex mathematical transformation that encrypts or decrypts binary data
Term
encryption key
Definition
a binary input to the encryption algorithm typically a long string of bits
Term
symmetric key encryption
Definition
encryption method that uses the same key to encrypt and decrypt the data
Term
remote wipe
Definition
security measure that automatcally deletes sensitive data from a protable device when unauthorized access are attempted
Term
asymmetric key encryption
Definition
encryption method that uses different keys to encrypt and decrypt the data
Term
public key encryption
Definition
a form of asymmetric key encryption that uses a public key for encryption and a private key for decryption
Term
digital signature
Definition
a technique in which a document is encrypted by using a private key to verify who wrote the document
Term
digital certificate
Definition
an institutions name and public key plus other info such as address website url and validity date of the certificate encrypted and certified by a third party
Term
certifying authority
Definition
a widely accepted issuer of digital certificates
Term
Secure sockets layer SSL
Definition
a standard set of methods and protocals that address authentication authorization privacy and integrity
Term
transport layer security
Definition
an internet standard equivalent to SSL
Term
IP security IPSec
Definition
an internet standard for secure transmission of low level network packets
Term
Secure hypertext transport protocal HTTPS
Definition
an internet standard for security transmitting web pages
Supporting users have an ad free experience!