Term
|
Definition
|
|
Term
| Rationalization of change |
|
Definition
| streamlining of operating processes |
|
|
Term
| Business process reengineering |
|
Definition
| Radical design of the business process |
|
|
Term
|
Definition
| Radical reconceptualization |
|
|
Term
|
Definition
| development method used by most org. today for large complex systems |
|
|
Term
|
Definition
| sequence of steps in the SDLC with cycles returned to previous stops, |
|
|
Term
|
Definition
| IS professionals who specialize in analyzing and designing info systems |
|
|
Term
|
Definition
| IS professionals who modify existing computer programs or write new computer programs to satisfy user requirements |
|
|
Term
|
Definition
| experts in a certain type of technology, such as databases or telecommunications |
|
|
Term
|
Definition
| Define the system to be developed. Set the project scope, the plan should include tasks resources and timeframes |
|
|
Term
|
Definition
| written definition of the project scope …usually no longer then a paragraph |
|
|
Term
|
Definition
| defines what when and who questions of system development including all acitivities individuals and resources needed for the activities and the time required to complete each activity |
|
|
Term
|
Definition
| represent the key dates for which you need a certain group of activities performed |
|
|
Term
|
Definition
| is an individual who is an expert in planning and management, he defines the project plan and tracks it to ensure all milestones are met in time |
|
|
Term
|
Definition
| study to determine the probability of success of proposed system development project and asses the projects Technical, Economic and Behavioral feasibility |
|
|
Term
|
Definition
Examination of the business problem the org. plans to solve with info. systems Requirements definition document – End users and IT work together to create a document that prioritizes the business requirements (requires approval by knowledge workers) (can include strengths and weakness of old system…Necessary functions for the new system, and user info requirements for the new systems. |
|
|
Term
|
Definition
technical blueprint of how proposed system will work and define the tech architecture…(Outputs, Inputs, Interfaces, hardware software, databases, telecommunications, personnel and procedures.) |
|
|
Term
|
Definition
The translation of the design specifications into comp. code which becomes the actual system |
|
|
Term
|
Definition
Checks to see if the comp code will produce the expected and desired results Under certain conditions (for Syntax errors - spelling commas, Logic errors – program runs with incorrect output, ) |
|
|
Term
|
Definition
| converting from the old system to the new |
|
|
Term
|
Definition
| monitor and support new system to ensure it continues to meet business goals. Help desk for support, (add new functioning, updating for changes and debugging) |
|
|
Term
|
Definition
| process of building experimental system quickly and inexpensively for demonstration and evaluation. |
|
|
Term
|
Definition
| IT Specialists with in organization will develop the system |
|
|
Term
|
Definition
| develop system by end users with little or no formal assistance from specialists |
|
|
Term
|
Definition
| the delegation of specific work to a third party for a specific length of time, specific cost, specified level of service |
|
|
Term
|
Definition
| The principles and standards that guide our behavior toward other people |
|
|
Term
|
Definition
| intangible creative work that is embodied in physical form |
|
|
Term
|
Definition
| you may use copyrighted material in certain situations |
|
|
Term
|
Definition
| protection afforded an expression of an idea |
|
|
Term
|
Definition
| unauthorized use duplication distribution or sale of copyrighted software |
|
|
Term
|
Definition
| Taking a shit while coppin some brain ya diggggg |
|
|
Term
|
Definition
| software manufactured to look like the real thing and sold like it is the real thing |
|
|
Term
|
Definition
| the right to be left alone when you want to be, control of your own personal possessions and not to be observed w/o your consent. |
|
|
Term
|
Definition
| program that records every keystroke and mouse click |
|
|
Term
|
Definition
| a small record deposited on your hard disk by a web site containing info about you and your web activities |
|
|
Term
|
Definition
| software to generate ads that installs itself on your comp when you download another program from the web |
|
|
Term
|
Definition
| software you don’t want hidden inside what you do |
|
|
Term
|
Definition
| comes hidden in free downloadable software and tracks online movements, also mines the info stored in computer, or uses cpu and storage for some tasks you know nothing about. |
|
|
Term
|
Definition
| Consists of one line of info for every visitor to a site and is stored on a web server |
|
|
Term
|
Definition
| records info about you during a web surfing session such as what web sites you visited, how long, what adds you viewed, what you bought |
|
|
Term
|
Definition
| anonymous web browsing – hides your identity from web sited you visit |
|
|
Term
|
Definition
| Bustin a monster load on the chin so it looks like santa ya digggg |
|
|
Term
|
Definition
HIPPA, limit release and use of health info, right to access your own records, specifies circumstances of access and disclosure if the recipients signs protection agreement The Privacy act- restricts info government can collect Freedom of information act – citizens have the right to access info the govt has abt them Bork Bill – video privacy act prohibits use of video rental info on customers for any thing else other then marketing directly to customers. |
|
|
Term
|
Definition
| Copying the info stored on a computer |
|
|
Term
|
Definition
| the use of physical characteristics (finger print, retina scan ) to prove identification |
|
|
Term
|
Definition
| the study of secrete (crypto) writing (graphy) |
|
|
Term
|
Definition
| scrambling/concealing a message |
|
|
Term
|
Definition
| process of transforming cipher text message back to plain text message |
|
|
Term
|
Definition
| method used to encrypt a message |
|
|
Term
|
Definition
| random secrete value placed with the cipher to encrypt or decrypt messages |
|
|
Term
|
Definition
extensible hypertext markup language – xtml and xml hybrid. All tags must be closed, all tags are lowercase (except for DOCTYPE tag) , all tag attributes are quoted |
|
|
Term
|
Definition
| to help enhance law enforcement investigation tools (authority to use wire taps for terrorism and fraud) |
|
|
Term
| Dept of Homeland Security |
|
Definition
| monitors the internet for “State—sponsored information warfare” |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Computer Fraud and Abuse Act |
|
Definition
| – passed by congress to reduce hacking |
|
|
Term
| Digital Millennium Copyright Act |
|
Definition
world intellectual property organization (controls copyrights on Digital Rights) |
|
|
Term
| Grammm-Leach-Bliley Act (glb) |
|
Definition
banks can not offer investing, commercial banking or insurance services. Also investment banks can merge. SAFEGAURDS RULE (security of info plan) PRETEXTING PROTECTION (social engineering when some one tries to gain unauthorized access to another persons personal info) Also defines consumer/client privacy rights. Consumer vs. Customer (customer has ongoing relationship beyond simple cash transaction) |
|
|
Term
|
Definition
|
|
Term
|
Definition
| examine media for evidence |
|
|
Term
|
Definition
| review of software for malicious signatures |
|
|
Term
|
Definition
| scrutinize network traffic and logs to identify and locate |
|
|
Term
|
Definition
the collection, authentication, preservation, and examination of electronic info for presentation in court ( 2 phases 1-collection, authenticating and preserving electronic evidence, 2-analyzing the findings) |
|
|
Term
|
Definition
| hard disk removed w/o turning on comp, hardware used to ensure nothing is written on drive, Forensic Image Copy – an exact copy of all stored info |
|
|
Term
|
Definition
| – make sure no evidence was planted or destroyed. (Use the MD5 hash value – unique for each storage medium at a specific point in time) |
|
|
Term
|
Definition
| Interpretation of info uncovered. Recovered info is put in context. Can pinpoint location on disk, creator &date created |
|
|
Term
|
Definition
| space between the end of the file and the end of the cluster |
|
|
Term
|
Definition
| set of clusters that has been marked as available to store info but has not yet received any |
|
|
Term
|
Definition
writing or hidden writing, can be hidden in text or image files S-Tools, DPEnvelope, Jpgx, tte. The mechanism to hide relatively small amount of data in other data file that are significantly larger |
|
|
Term
|
Definition
| Rate at which one channel caries info from one computer to another |
|
|
Term
|
Definition
| volume or capacity of data a channel can carry |
|
|
Term
| Transmission Mode way by wich the data is transmited |
|
Definition
Asynchronous (one bit at a time) Synchronous (blocks of bytes) |
|
|
Term
|
Definition
| Three directions for transmitting data include simplex, half duplex and duplex |
|
|
Term
|
Definition
| info travels as analog or digital signals |
|
|
Term
|
Definition
| the paths, or physical channels, in a network over which information travels. |
|
|
Term
| Wired communications media |
|
Definition
| transmit information over a closed, connected path. Twisted pair cable(telephone Ethernet) Coaxial Cable(Cable TV) Fiberoptic (DWDM) |
|
|
Term
| Wireless communications media |
|
Definition
| transmit information through the air Feasibility study, project scope, information requirements |
|
|
Term
|
Definition
| a device that connects multiple computers into a network |
|
|
Term
|
Definition
| a device that connects multiple computers into a network in which multiple communications links can be in operation simultaneously |
|
|
Term
|
Definition
| a device that acts as a smart hub connecting computers into a network, and it also separates your network from any other network it’s connected to |
|
|
Term
|
Definition
| A network configuration in which all computers on the network are connected through a single circuit, such as twisted-pair cable. Messages are transmitted to all computers on the network, although only the targeted device responds to the message. |
|
|
Term
|
Definition
| A network configuration in which computers are arranged in the form of a ring using twisted-wire, coaxial cable, or fiber optics. Messages are transmitted in one direction to all devices between the sending node and the receiving node |
|
|
Term
|
Definition
| A topology in which a central host computer receives all messages and then forwards the message to the appropriate computer on the network. |
|
|
Term
|
Definition
| covers a limited geographic distance, such as an office, building, or a group of buildings in close proximity to each other. |
|
|
Term
| Municipal area network (MAN) |
|
Definition
| covers a metropolitan area |
|
|
Term
|
Definition
| covers a large geographic distances, such as a state, a country, or even the entire world. |
|
|