Authentication
A type of identification that requires the user to provide something that they know, something that they have, or something that they are.
HDMI (High Definition Multimedia Interface)
is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data
LAN (Local Area Network)
a geographic network that covers a relatively small geographic area such as a building or a office space - no more than a mile distance between computers
Paid
Paid
Authorization
The process of giving someone permission to do or have something. Ex: Authorization to certain rooms
WAN (Wide Area Network)
A network that spans a long distance and connects two or more LANs.
VGA (Video Graphics Adapter)
a graphics standard for video display controller first introduced with the IBM. These Adapters do not deliver audio only video.
pseudocode
a high-level description of the actions of a program or algorithm, using a mixture of English and informal programming language syntax
subroutine
A small program inside a large one. Used when the same series of commands are repeated multiple times.
Analog Signal
continuous electrical signals or waves sent by a computer to display information on a monitor
Accountability
The process of monitoring and recording what someone has accessed or modified in the system
DVI (Digital Visual Interface)
Port that enables digital signals to transmit directly to the LCD monitor
Multi-factor Authentication
Authentication that requires two or more evidences of authentication, usually of different types.
Digital signal
A system of discrete states: high or low, on or off, 1 or 0 sent by a computer to display information on a monitor
SATA (Serial AT Attachment)
A popular bus used to connect hard drives and other mass storage devices to the computer.
compiled language
A programming language in which the program code must be submitted to a compiler that manipulates the code, translating it into a more basic language that machines can understand.
Single Sign-on
A method of authenticating with one system to gain access to other related systems.
twisted-pair cable
Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire).
USB Universal Serial Port
An external bus standard that supports data transfer.
interpreted language
A programming language in which programs are "indirectly" executed by an interpreter program.
fiber-optic cable
A cable that transmits data at close to the speed of light along glass or plastic fibers. This type of wiring is expensive, but is immune to light, sound, and electrical interference.
query language
A specially designed computer language used to manipulate data in or extract data from a database.
fire wire port
port that can connect multiple types of devices that require faster data transmission speeds
assembly language
A programming language that represents machine code in human-readable text. Typically specific to a particular hardware architecture.
driver
A small program that instructs the operating system on how to operate a specific piece hardware.
client-server LAN
A computer (or more than one computer) called a server manages the network resources for all of the client devices on the network
Device Password
A security concern regarding network devices and other devices, such smartphones, that give the option of using the device without a password.
USB Type A
Printer, Scanner, Camera, Mouse, Keyboard, External CD-Rom, MP3 player, PDA
peer-to-peer LAN
There is no server, and people on the network each determine what files they will share with others on the network.
markup language
A means of marking data in a document so that it is accessible to a program language.
variable
Contains a value that can change during the execution of a program.
USB Type-C Port
a new port used to support a smaller, reversible connector
Firewall
A device that controls the flow of network traffic to protect systems from unauthorized network connections.
Network Physical media
the cabling and connectors used to interconnect the network devices.
Ethernet Cable (RJ-45)
cable that connects computers to the LAN that allows the computers to communicate with each other and other peripherals.
wireless communication
Communications media that do not use cables but instead rely on radio waves to communicate.
constants
Contains a value that cannot be changed from within a program.
Anti-Malware Software
Software that helps protect against malicious software infections.
Anti-Spam Software
Software that helps remove unwanted, unsolicited email.
Intranets
a type of WAN in which private company networks allow employees to easily access, share, and publish information using internet software
Telephone Connector (RJ-11)
A fax modem uses twisted pair cabling with an RJ-11 connector at the fax end and a connector suitable for use with the country's phone system at the other end. Once used by dial up modems.
NFC (Near Field Communication)
Mobile technology that enables short-range ( around 2-inches) wireless communication between mobile devices. Now used for mobile payment technology such as Apple Pay and Google Wallet
Extranets
a type of WAN in which private intranets extended to authorized users outside the organization usually through a VPN
Ecommerce
The buying and selling of products or services electronically, typically through the Internet.
Public/Private Classification
An attribute used to classify information based on the risk of public disclosure.
Bluetooth
Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices
loop
Used to repeat code in your program.
procedures
a segment of code that can be reused
Display Port
an alternative to DVI that also supports HDMI
Government/Military Classification
A scheme for classifying information based on government and military requirements.
function
a segment of code that can be reused, and return a value to whatever called it.
Data Destruction Policy
Directions for disposing and even destroying data when it's no longer needed or when a storage device needs to be replaced.
attributes
Values and data types that define an object in Object-Oriented Programming
Data Redundancy
A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
modem
A device converts analog signals to digital signals, typically seen in areas that use telephone lines
Network Redundancy
A method of increasing fault tolerance by providing multiple network paths between hosts.
Thunderbolt port
A high speed input/output port; Thunderbolt 2 provides two channels of 20 Gbps capacity on one port.
methods
What you can do to an object in Object-Oriented Programming
Router
A device that transfers data from one network to another in an intelligent way
Power Redundancy
A method of increasing fault tolerance by providing power backups and power failover.
HID (Human Interface Device)
Input devices (peripherals) that enable the user to enter data and select commands
properties
Alternative ways of accessing a field publicly in Object-Oriented Programming.
batch file
A text file containing a series of OS commands.
RFID (Radio Frequency Identification)
uses radio signals to communicate with a tag placed in or attached to an object
Network Interface Cards
Provides a place to plug the network cable into the computer and it creates and sends the signal from one network component to another.
Network Attached Storage
A device that contains one or more hard drives that users can access over the network.
Coaxial cable (coax)
Cable consisting of a hollow outer cylindrical conductor that surrounds a single inner wire conductors
Ad Hoc Backup
Unscheduled backups performed periodically.
Windows PowerShell
Command-line tool included with Windows. Offers a number of powerful scripting tools for automating changes both on local machines and over networks.
VBScript
an object-oriented scripting language that Microsoft derived from the Visual Basic programming language
PS/2 port
a round 6-pin port used by a keyboard or mouse.
Regular Backup
Regularly scheduled backups.
wired communication
Use of wires and cables to connect and communicate for internet access
Client Device/Host/Node
A device (Tablet, Phone, Desktop, Laptop) that is connected to the network
Motherboard
A printed circuit board that connects all PC components
single-platform software
written to run under a particular operating system
System Backup
A backup of the system software, including operating system files.
Servers
Computers or devices that provide access to various network services, such as printing, data storage, and communications.
cross-platform software
written to run under multiple operating systems or platforms.
Firmware
Software that is permanently stored into hardware to give instructions
Database Backup
A backup of data stored in a database.
Local Installation
The traditional method for delivering applications by installing them on individual desktop computer systems.
Basic Input/Output System/BIOS
Software built into the ROM that is the first instructions the computer processes to test devices
Internet Service Provider (ISP)
a company that provides access to the internet for a monthly fee
Local Backup
Backups that are stored in the same building or even the same room as the computer systems they are taken from.
database
a collection of organized data that allows access, retrieval, and use of data
Off-site Backup
Backups that are stored at a location far enough from a possible natural disaster while being close enough to recover the data and systems within a reasonable amount of time.
Copper Cable
Low cost method of providing connections in a network. Signal strength is lost with distance and can only work over short distances. Suffers from electrical interference.
32-bit CPU
Slightly outdated form of processing with approximately 4 GB of RAM available
database
a collection of organized data that allows access, retrieval, and use of data
64-bit CPU
Modern CPU that allows for much more RAM to be used than a 32-bit
Disaster Recovery
An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
cellular network
A wireless network which uses cell towers to transfer information.
Business Continuity
The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
Satellite Network
A Wireless network which uses satellites to communicate and transfer information
Intel CPU Brands
Core, Pentium, Celeron, Atom, Xeon
Network Hosting
A method of delivering applications by installing them in the local network.
tables
An arrangement of data made up of horizontal rows and vertical columns.
Systems Administrator
a person responsible for securing networks and responding to intrusions as well as tickets from users
Ryzen & Epyc
The AMD CPU brands designed for desktop and workstation computers include:
TCP/IP Model Layers
1. Application
2. Transport
3. Internet
4. Network Access
tables
An arrangement of data made up of horizontal rows and vertical columns.
Computer Forensics Expert
A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.
Bus
The paths, or lines, on the motherboard on which data, instructions, and electrical power move from component to component.
Application Layer
The first layer of the TCP/IP model. Application layer protocols enable software programs to negotiate formatting, procedural, security, synchronization, and other requirements with the network.
Security Analyst
A person who is in charge of designing and implementing security methods to protect an organization's computer systems and networks.
Transport Layer
Second layer in the TCP/IP stack. Sets-up a connection between the two hosts, agrees the protocol and packet size. These two Protocols are TCP and UDP
Types of Bus
PCI (32 Bit), PCI Express or PCIe 1.0, PCIe x16 (4 GBpsGraphics adapters use x16 lanes)
Cloud Hosting
A method of delivering applications by hosting them in the cloud.
Heatsinks
passive cooling systems that looks like metal fins to dissipate heat from components like chips
Internet Layer
responsible for addressing, packaging, and routing messages on the Internet
record
A collection of fields that appear as a row in a database or table.
Social Engineering
hackers use their social skills to trick people into revealing access credentials or other valuable information
Phishing
E-mail or pop-up message; usually looks like it's from a legitimate financial institution and TRICKS you into provide your personal information in order to fix a problem with your account
Data Link/Network Access Layer
handles all the physical details of interfacing with the cable, including the network interface card and a device drivers.
Thermal paste
A compound used to bridge the thermal gap between the surface of a chips packaging and the mating surface of a heatsink.
record
A collection of fields that appear as a row in a database or table.
Impersonation/ Identity Theft
Someone who is pretending to be another person. They may use your name and other personal information.
TCP (Transmission Control Protocol)
Provides reliable in the Transport-layer protocol, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
bootstrapping or booting a computer
standard means for the CPU to start processing instructions and initialize the other components
field
a single characteristic of data that appears in a table as a column
Shredding
A procedure to destroy documents to protect your financial information and PII
Software as a Service (SaaS)
A term associated with cloud hosting. SaaS provides users with the applications they need to do their day-to-day work through the cloud.
UDP (User Datagram Protocol)
A Transport-layer protocol that is one of the protocols in the Internet protocol suite, and excludes error checking and quality assurance, this protocol is faster than TCP.
field
a single characteristic of data that appears in a table as a column
UEFI (Unified Extensible Firmware Interface)
provides support for 64-bit CPU operation at boot, a full GUI and mouse operation at boot, and better boot security. A computer with UEFI may also support booting in a legacy BIOS mode.
ARP
Address Resolution Protocol. Resolves IP addresses to MAC addresses. ARP Tables include a map of the different devices with a MAC address
Personally Identifiable Information (PII)
the name, postal address, or any other information that allows tracking down the specific person who owns a device
dumpster diving
Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away
Internet Protocol (IP)
The network protocol that deals with the routing of packets through interconnected networks to the final destination. Every hosts on a network is given an IP Address to identify it on the network.
Optical Drive (CD/DVD)
A storage device that uses light instead of magnetism to store information. This include CD-ROM, DVD, and Blu-ray devices.
One Tier
An application architecture model where programs run as standalone applications on a single computer.
Packet Structure
...
shoulder surfing
Watching an authorized user enter a security code or password on a keypad/keyboard.
External hard Drive
An HDD that can be connected as a peripheral to a computer.
flat file
Simple database program whose records have no relationship to one another
Network Interface Card (NIC)
A component, sometimes built into and sometimes plugged into the motherboard, that provides wired or wireless (or both) network connectivity.
IP address
A number assigned to any node that is connected to the Internet. They are formatted to take 4 different spaces Ex:
192.168.12.2
Security Training
teaching computer users not to click on communications or software that they are not expecting to receive
flat file
Simple database program whose records have no relationship to one another
Security Policies
Rules set in place by a company to ensure the security of a network. These may include how often a password must be changed or how many characters a password should be, require employees to go through security training, or have users log-out of there comp
IPv4
The Internet Protocol version 4 is the dominant protocol for routing traffic on the Internet, specifying "to" and "from" addresses using a 32-bit binary set
Flash Storage
A compact, portable storage device that uses special memory chips to store data. Flash storage devices can be removed from a power source and its contents will remain intact.
Two Tier
An application architecture model with two separate tiers (a client and a server) where applications store and retrieve data from a central repository.
Power Supply
The component of a computer that supplies the right amount and form of electricity to the motherboard and other computer components.
IPv6
A new protocol developed to replace IPv4, addressing the issue of IP address exhaustion using a 128-bit binary set
comma-seperated-values
separates each piece of data with a comma
Fault Tolerance
the ability for a system to respond to unexpected failures or system crashes by using a backup system immediately and automatically takes over with no loss of service
Outage Cost
Financial damage and reputational damage, causing the company to lose money and customers.
MAC address (Media Access Control)
A unique identifier similar to a serial number assigned to equipment or devices at the time of manufacture. On a network, an IP address is linked to a MAC address
Plug and Play
technology that allows a hardware component to be attached to a computer so that it is automatically configured by the operating system, without user intervention
comma-seperated-values (CSV)
file uses commas to identify the end of a column and a line feed for each row
Device Hardening
Security tasks used to reduce the scope
of the device's vulnerability and attack surface.
Subnetting
The process of logically dividing a network
into smaller subnetworks or subnets.
Device Manager
Primary Windows tool for managing hardware.
relational database
A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables
Antivirus Software
Software used to detect and eliminate computer viruses and other types of malware.
relational database
A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables
Web Interface
The interaction between a user and software running on a web browser. The page is downloaded and rendered.
Network ID
The portion of an IP address common to all nodes on the same network or subnet.
Network ID: 172.30.0.0
Host 1's Address: 172.30.15.12
Host 2's Address: 172.30.15.24
Three Tier
An application architecture model with three separate tiers where an application presents the user interface on a client workstation, data is processed on an application server, and information is retrieved from a database management system on a database
LCD (liquid crystal display)
Type of display commonly used on portable computers. LCDs have also replaced CRTs as the display of choice for desktop computer users.
DNS (Domain Name System)
The Internet's system for converting alphabetic names into numeric IP addresses.
Malware
software designed to infiltrate or damage a computer system without the user's informed consent.
-Spyware
-Adware
-Trojan Horse
-Ransomware
Patch Management
The practice of monitoring for, evaluating,
testing, and installing software patches and updates.
FQDN (Fully Qualified Domain Name)
A host name plus domain name that uniquely identifies a computer or location on a network.
CRT Monitor (Cathode Ray Tube)
desktop monitor that contains a cathode-ray tube
n-Tier
An application architecture model where application developers add as many tiers as they need to create the most efficient services and processes on a network.
RDBMS (Relational Database Management System)
A system that stores information, which is linked by a unique identifiers in tables.
laser printer
uses a toner cartridge filled with fine powder and a heated fuser
URL (Uniform Resource Locator)
A location or address identifying where documents can be found on the Internet; a Web address or a 'link'
OEM (Original Equipment Manufacturer)
The original manufacturer of a hardware component or sub-component.
Structured Query Language (SQL)
an international standard language used to maintain and query (search) data in the database.
inkjet printer
A nonimpact printer that sprays tiny drops of ink onto paper.
Signed Code
Code that is digitally signed by the creator; great for Microsoft and Google, not really important for small users with no inherit credibility
default gateway
The first IP address of the device that a client computer will look for when attempting to gain access outside the local network. This is usually the IP of the Router on the network
Abandon ware
computer software that is no longer distributed or supported by the developer or copyright holder.
Platform Compatibility
A concern with using enterprise software in a network with multiple computer platforms and operating systems.
CMYK (Cyan, Magenta, Yellow, Black)
the four ink colors used to create most process color printing
DHCP (Dynamic Host Configuration Protocol)
A network protocol that provides automatic
assignment of IP addresses and other TCP /IP configuration information to devices on the network.
Webcam
A camera that broadcast images through the Internet through a computer or web cell phone.
Structured Query Language (SQL)
an international standard language for processing a database
top-level domain
Domains (including .net, .org, .com, .mil. and the set .xx country codes) at the end of a domain name are the highest level of the domain name hierarchy.
biometric authentication
uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users
Quarantine
The process of separating malware or malicious software from the computers primary system
Hyper Text Transfer Protocol (HTTP)
The way data is transferred to an external site through a server.
printer consumables
Paper, Toner, Fusers and Rollers
Primary Key
A field (or group of fields) that uniquely identifies a given entity in a table
thermal printer
generates images by pushing electrically heated pins against the heat-sensitive paper
foreign key
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables
HTTPS (Hypertext Transfer Protocol Secure)
An encrypted version of HTTP. It ensures information you access is securely accessed
Updates
Changes to formally controlled documentation, plans etc., to reflect modified or additional ideas or content.
Firmware
Software that is permanently stored in a chip. The BIOS on a motherboard is an example of firmware.
FTP (File Transfer Protocol)
A protocol used to move files and folders over a network or the Internet.
volatile memory
memory that is lost when the computer is turned off. All RAM Modules are volatile
Primary Key
A field (or group of fields) that uniquely identifies a given entity in a table
virus definition
The characteristics of a list of known viruses.
SOHO (Small office/home office)
A small business office with between 1 and 10 users.
solid state drive (SSD)
long-term storage device that contains no moving parts. It's Solid, so nothing is moving.
Proprietary Software
Software that isn't owned but requires the purchase of a license to use the software.
hard disk drive (HDD)
A long-term storage device used to store and retrieve data from rapidly rotating disks coated with magnetic material.
Personal License
A software license given to home and small business customers that allows them to install the software on a limited number of systems.
Wireless Access Point (WAP)
is a network device that serves as an interface between devices and the network. Access Points are used to extend wireless access in a network in the event the Router is further away.
Access Control List (ACL)
A clearly defined list of permissions that specifies what actions a user may perform on a shared resource or if they are authorized to use it at all
foreign key
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables
DSL (digital subscriber line)
A telephone line that carries digital data from end to end, and is used as a type of broadband Internet access. These usually require a Modem to convert phone signals to digital signals
Role-Based Access Control (RBAC)
A control system in which access decisions are based on the roles of individual users as part of an organization. Roles could go under Job Title or Department
flash memory devices
Electronic storage devices that are compact, portable, require little power, and contain no moving parts.
Mandatory Access Control (MAC)
The most restrictive access control model, typically found in military settings in which security is of supreme importance.
Fiber Optic Network
Dedicated wire to rapidly and reliably transmit masses of multimedia data at the same time that it's handling voice messages.
file system
Determines the way an operating system stores files on disk.
unstructured data
Not defined and does not follow a specified format
Rule-Based Access Control
An access control model that based on a list of predefined rules that determine what accesses should be granted
Fiber to the Home (FTTH)
provides home users with Internet access via fiber-optic cable
disk partition
A disk partition is a section of a hard drive that is treated as a separate storage unit;
Enterprise License
A software license, often called a volume license or a site license, that allows the customer to install the software without restriction using the same activation code, typically until a maximum cap is reached.
NTFS (New Technology File System)
A file system developed by Microsoft to be used with all Windows Operating Systems
Non-repudiation
The security goal of ensuring that data remains associated with the party that creates it or sends a transmission.
Fiber to the Curb (FTTC)
Takes the fiber even closer to the subscriber, bringing the optical fiber directly to the "curb" near customer homes and/or businesses.
constraints
limitations on what information can be inputted into a field.
metadata
data about data
ipconfig
Windows command that shows the IP configuration settings on a PC
Hardware Token
A device held by a user that displays a number or a password that changes frequently, such as every 60 seconds. The number is synchronized with a server and used as a onetime password.
FAT32
File allocation table that uses 32 bits to address and index clusters. Commonly
used with Flash drives or Flash Memory Devices
Wireless Standards
802.11b - 2.4 GHz 11 Mbps
802.11a - 5 GHz, 54 Mbps
802.11g - 2.4 GHz, 54 Mbps
802.11n - 5 GHz, 108 Mpbs
802.11ac - 5 GHz, 1.7 Gpbs
ext3 and ext4
File systems commonly used by Linux/Unix and Apple's Mac Operating system
Software Token
An app, or other software that generates a token for authentication.
Open Source Software
Software that can be downloaded, installed, and used without paying a licensing fee. The source code can also be downloaded, modified, and compiled and given to others as long as it is not resold for profit.
Task Manager
lists all the programs being used and indicates their status
unstructured data
Not defined and does not follow a specified format
Something you know
An authentication factor indicating knowledge, such as a password or PIN.
2.4 GHz
Wireless networking radio frequency that has moderate speeds but offers longer ranges.
Something you have
An authentication factor using something physical, such as a smart card or token.
5 GHz
Wireless networking radio frequency that has faster speeds but offers shorter range
File Explorer
The file management tool in the Windows Operating System used to organize files.
key/value pair database
a means of storing the properties of objects, without predetermining the fields used to define them.
Something you are
Authentication factor that relies on a physical characteristic (fingerprint, face, eye, palm)
Line of Sight (LOS)
The area you can clearly see in any direction
file permission settings
option that specify access rights for a specific file or directory
Data Definition Language (DDL)
The language that allows a database administrator to define the database structure, schema, and subschema.
file permission levels
A specific permission which can be granted on files and/or folders.
-Full Control
-Modify
-Read/list/execute
-Write
metadata
data about data
Data Encryption
A security measure for wireless networks that scrambles data transmitted between network devices.
Least Privilege
Providing only the minimum amount of privileges necessary to perform a job or function.
Software Subscription
Sometimes called SaaS or on-demand software, software that requires a monthly or annual fee to use the software and receive regular updates.
WEP (Wired Equivalent Privacy)
A key encryption technique for wireless networks that uses keys both to encrypt data
Default password
Password on system administration, user, or service accounts predefined in a system, application, or device; usually associated with default account. Default accounts and passwords are published and well known, and therefore easily guessed.
file types
indicates the type of application that produced the document:
PDF, RTF, DOCX, XLS, PPT
Global Positioning System (GPS)
A system that determines the precise position of something on Earth through a series of satellites, tracking stations, and receivers.
WPA
Wireless Protected Access. Wireless network encryption system.
executable files
programs or software that runs immediately after the user clicks on the file
.bat, .msi, .cmd, .com, .dll, .exe
Windows Update
A feature of the Windows operating system that keeps the operating system current.
Indoor Position System (IDS)
System that determines the precise location of something or someone in an indoor space.
WPA2
Wireless Protected Access 2. Wireless network encryption system. This is considered the most secure encryption standard for wireless networks
Audio ports
-1 Side Speaker (Grey)
-2 Rear Speaker (Black)
-3 Audio In Sub woofer (Orange)
-4 Microphone (Pink)
-5 Audio Out Speakers (Green)
-6 Analog Line/Telephone (Blue)
key/value pair database
a means of storing the properties of objects, without predetermining the fields used to define them.
Wireless Enterprise Network
Same WiFi standards, but using enterprise-level equipment.
Single Sign On (SSO)
Using one authentication credential to access multiple accounts or applications.
direct/manual access
Connecting directly to a database using administrative tools, and running SQL commands
plain text
Text or message which contains no encryption
Malware
software that is intended to damage or disable computers and computer systems.
Data Definition Language (DDL)
The language that allows a database administrator to define the database structure, schema, and subschema.
Viruses and Worms
The two types of malware that have the primary objective of infecting a computer.
query/report builder
Provides a GUI for users to select actions to perform on the database, and convert those selections to SQL statements that will be executed.
Cipher text
Message data after it has been encrypted.
Trojan Horse
a program that appears desirable but actually contains something harmful
Symmetric Encryption
An encryption method in which the same key is used to encrypt and decrypt a message. The key in this case is the algorithm used to translate the message.
Data Manipulation Language (DML)
A specific language, provided with a DBMS, which allows users to access and modify the data, to make queries, and to generate reports.
Programmatic Access
A software application can interact closely with a database either using SQL commands or using SQL commands stored as procedures in the database.
Adware
computer software that displays advertisements that can be a nuisance to the end-user.
grant
a command that grants a permission to a user
Encryption
Process of converting readable data into unreadable characters or scrambling data
Spyware
A type of Malware that locates and saves data from users without them knowing about it.
digital certificate
a notice that guarantees a user or a website is legitimate
Cipher types
-3DES
-AES
-RC
-Blowfish/Twofish
permissions
granting or denying a user access to files
Asymmetric Encryption
a type of cryptographic based on algorithms that require two keys - one of which is secret (or private) and one of which is public (freely known to others).
Cookies
small computer programs left behind on your computer when you visit a website. To target specific ads to you.
direct/manual access
Connecting directly to a database using administrative tools, and running SQL commands
Public Key Infrastructure (PKI)
A framework for managing all of the entities involved in creating, storing, distributing, and revoking digital certificates.
Personally Identifiable Information (PII)
any data that can be used to identify, locate, or contact an individual. Ex:
Name
Address
Date of Birth
deny
a command that overrides a grant
query/report builder
Provides a GUI for users to select actions to perform on the database, and convert those selections to SQL statements that will be executed.
digital signature
a means of electronically signing a document with data that cannot be forged
pop-up ad
A small web page containing an advertisement that pops on the users screen
digital certificate
a data file that uniquely identifies individuals or organizations online and is comparable to a digital signature
Firewall
Part of a computer system that is designed to block unauthorized access of applications and ports.
Boolean
A single value of either TRUE or FALSE.
antivirus software
Software used to detect and eliminate computer viruses and other types of malware.
Public Key
One of the keys used in asymmetric encryption systems. It is widely distributed and available to everyone.
Programmatic Access
Interacting with a database either using SQL commands
string
A collection of characters
Private browsing
A feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.
Private Key
In an asymmetric encryption scheme the decryption key is kept private and never shared.
network appliance
A device or equipment dedicated to working with a network: Ex:
-Switches
-Routers
-Wireless Access Port
create
a command that can be used to add a new database on the server,, or to add a new table within an existing database
Virtual Private Network (VPN)
Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a "private tunnel" within the Internet to another Network
Dictionary Attack
Attempt to break a password by trying all possible words.
booleon operators
A boolean operator, or logical operator, consists of operators such as AND, OR, NOT, NOR, NAND, and XOR. These operators are used with conditional statements in programming, search engines, algorithms, and formulas.
Network Attached Storage (NAS) or File Servers
A device or devices that have many hard drives to provide large amounts of disk space.
Attenuation
Loss of power in a signal as it travels long distances
Brute Force Attack
A password-cracking program that tries every possible combination of characters, given only part of the passwords
Data Manipulation Language (DML)
Database commands that modify the records within the database and not the schema itself.
alter
a command that allows you to add, remove (drop), and modify table columns (fields)
Backup
A copy of data that is made in case the original data is lost or damaged. The backup can be used to restore the original data.
Printer Sharing or Print Server
allows a computer user to share his or her attached printer with other users on a network
drop
a command that can be used to delete a table
cloud storage
An Internet service that provides remote storage or access to resources to users through an app or website. The term 'Cloud' is used in terms of high availability, much like actual clouds.
NoSQL
Nonrelational databases that arise from big data.
Universal Naming Convention (UNC)
A naming system used by Windows computers to locate network file shares and network printers. The format is \\computername\foldername.
insert
a command that adds a new row into a table in the database
Drive Mapping
A process of assigning a drive letter to a storage device located on a different network workstation.
Database Administrator
A person who is responsible for designing, maintaining, backing up, and securing an organization's databases.
SMTP
(Simple Mail Transfer Protocol) The main protocol used to send electronic mail from server to server on the Internet.
update
a command that changes the value of one or more table columns
IMAP (Internet Message Access Protocol)
a common protocol for retrieving email messages from the server, but is not directly downloaded
Database Developer
A person who designs and implements databases, usually by writing SQL code and conducting performance tests to ensure database optimization.
POP(Post Office Protocol)
used to retrieve email from a server and download it directly on the device.
delete
a command that removes records from within a table
proxy server
A form of network security that acts as a go-between for who can make requests or access resources on a network.
Data Analyst
A person who specializes in gathering and analyzing data to inform business decisions.
Data Scientist
A person who focuses on data analysis, especially as it relates to data mining and big data analytics. These positions require even more advanced programming and analytical skills.
select
a command that allows you to query a database and retrieve data from it.
grant
a command that grants a permission to a user
Data Mining
A broad and open-ended analysis of extracted big data.
deny
a command that overrides a grant
Data Extraction
The process of gathering and organizing big data.
integers
Whole numbers and their opposites (. . . -3, -2, -1, 0, 1, 2, 3. . .)
floating point numbers
decimal numbers(0.5, 0.99, 0.10)
Boolean
A single value of either TRUE or FALSE
character
a letter of the alphabet, a symbol, or a number
string
A sequence of characters; the primary data type for text. (Ex: 'Word' 'Happy' Hello')
Unicode
A encoding standard that enables most of the languages in the world to be symbolized with a special character identification. (Ex: a, &, �, �)
ASCII (American Standard Code for Information Interchange)
A Character encoding standard for English Symbols specifically.