Shared Flashcard Set

Details

Chapter 12
Databases, Controls, & Security
61
Computer Science
Undergraduate 2
04/17/2012

Additional Computer Science Flashcards

 


 

Cards

Term
Database
Definition
an integrated collection of stored data that is centrally managed and controlled
Term
Database Management System (DBMS)
Definition
a system software component that manages and controls one or more databases
Term
Physical Data Store
Definition
database components that stores the raw bits and bytes of data
Term
Schema
Definition
database component that contains descriptive information about the data stored in the physical data store
Term
Relational database Management System (RDBMS)
Definition
a DBMS that organizes data in tables or relations
Term
Table
Definition
a two-dimensional data structure of columns and rows
Term
Row
Definition
one horizontal group of data attribute values in a table
Term
Attribute
Definition
one vertical group of data attribute values in a table
Term
Attribute Value
Definition
the value held in a single table cell
Term
Key
Definition
an attribute or set of attributes, the values of which occur only once in all the rows of the table
Term
Primary key
Definition
the key chosen by a database designer to represent relationships among rows in different tables
Term
Foreign Key
Definition
an attribute that duplicates the primary key of a different (foreign) table
Term
Referential Integrity Constraint
Definition
a constraint, stored in the schema, that the DBMS uses to automatically enforce referential integrity
Term
Normalization
Definition
a formal technique for evaluating and improving the quality of a relational database schema
Term
First Normal Form (1NF)
Definition
restriction that all rows of a table must contain the same number of columns
Term
Relational Integrity
Definition
a consistent state among foreign key and primary key values
Term
Functional Dependency
Definition
a one-to-one association between the values of two attributes
Term
Second Normal Form (2NF)
Definition
restriction that a table is in 1NF and that each non-key attribute is functionally dependent on the entire primary key
Term
Third Normal Form (3NF)
Definition
restriction that a table is in 2NF and that no non-key attribute is functionally dependent on any other non-key attribute
Term
Data Type
Definition
the storage format and allowable content of a program variable, class, attribute, or relational database attribute or column
Term
Primitive Data Type
Definition
a data type supported directly by computer hardware or a programming language
Term
Complex Data Type
Definition
combinations of or extensions to primitive data types that are supported by programming languages, operating systems, and DBMSs
Term
Single Database Server Architecture
Definition
one or more databases are hosted by a single DBMS running on a single server
Term
Replicated Database Server Architecture
Definition
complete database copies are hosted by cooperating DBMSs running on multiple servers
Term
Partitioned Database Server
Definition
multiple distributed database servers are used and the database schema is partitioned, with some content on only one server and some content copied on all servers
Term
Cloud-Based Database Server Architecture
Definition
use of a cloud computing service provider to provide some or all database services
Term
Database Synchronization
Definition
updating one database copy with changes made to other database copies
Term
Integrity Control
Definition
a control that rejects invalid data inputs, prevents unauthorized data outputs, and protects data and programs against accidental or malicious tampering
Term
Input Control
Definition
a control that prevents invalid or erroneous data from entering the system
Term
Value Limit Control
Definition
a control that checks numeric data input to ensure that the value is reasonable
Term
Completeness Control
Definition
a control that ensures that all required data values describing an object or transaction are present
Term
Data Validation Control
Definition
a control that ensures that numeric fields that contain codes or identifiers are correct
Term
Field Combination Control
Definition
a control that reviews combinations of data inputs to ensure that the correct data are entered
Term
Access Control
Definition
a control that restricts which person or programs can add, modify, or view information resources
Term
Transaction Logging
Definition
a technique by which any update to the database is logged with such audit information as user ID, date, time, input data, and type of update
Term
Complex Update Control
Definition
a control that prevents errors that can occur when multiple programs try to update the same data at the same time or when recording a single transaction requires multiple related database updates
Term
Output Control
Definition
a control that ensures that output arrives at the proper destination and in accurate, current, and complete
Term
Fraud Triangle
Definition
model of fraud that states that opportunity, motivation, and rationalization must all exist for a fraud to occur
Term
Security Control
Definition
a control that protects the assets of an organization from all threats, with a primary focus on external threats
Term
Authentication
Definition
the process of identifying users who request access to sensitive resources
Term
Multifactor Authentication
Definition
using multiple authentication methods for increased reliability
Term
Access Control List
Definition
a list attached or linked to a specific resource that describes users or user groups and the nature of permitted access
Term
Authorization
Definition
the process of allowing or restricting a specific authenticated user's access to a specific resource based on an access control list
Term
Unauthorized User
Definition
a person who isn't allowed access to any part or functions of the system
Term
Registered User
Definition
a person who is authorized to access the system
Term
Privileged User
Definition
a person who has access to the source code, executable program, and database structure of the system
Term
Encryption
Definition
the process of altering data so unauthorized users can't view them
Term
Decryption
Definition
the process of converting encrypted data back to their original state
Term
Encryption Algorithm
Definition
a complex mathematical transformation that encrypts or decrypts binary data
Term
Encryption Key
Definition
a binary input to the encryption algorithm - typically a long string of bits
Term
Symmetric Key Encryption
Definition
encryption method that uses the same key to encrypt and decrypt the data
Term
Remote Wipe
Definition
security measure that automatically deletes sensitive data from a portable device when unauthorized accesses are attempted
Term
Asymmetric Key Encryption
Definition
encryption method that uses different keys to encrypt and decrypt the data
Term
Public Key Encryption
Definition
a form of asymmetric key encryption that uses a public key for encryption and a private key for decryption
Term
Digital Signature
Definition
a technique in which a document is encrypted by using a private key to verify who wrote the document
Term
Digital Certificate
Definition
an institution's name and public key (plus other information, such as address, Web site URL, and validity date of the certificate) encrypted and certified by a third party
Term
Certifying Authority
Definition
a widely accepted issuer of digital certificates
Term
Secure Sockets Layer (SSL)
Definition
a standard set of methods and protocols that address authentication, authorization, privacy, and integrity
Term
Transport Layer Security (TLS)
Definition
an internet standard equivalent to SSL
Term
IP Security
Definition
an internet standard for secure transmission of low-level network packets
Term
Secure Hypertext Transport Protocol (HTTPS)
Definition
an internet standard for securely transmitting Web pages
Supporting users have an ad free experience!