Term
|
Definition
an integrated collection of stored data that is centrally managed and controlled |
|
|
Term
Database Management System (DBMS) |
|
Definition
a system software component that manages and controls one or more databases |
|
|
Term
|
Definition
database components that stores the raw bits and bytes of data |
|
|
Term
|
Definition
database component that contains descriptive information about the data stored in the physical data store |
|
|
Term
Relational database Management System (RDBMS) |
|
Definition
a DBMS that organizes data in tables or relations |
|
|
Term
|
Definition
a two-dimensional data structure of columns and rows |
|
|
Term
|
Definition
one horizontal group of data attribute values in a table |
|
|
Term
|
Definition
one vertical group of data attribute values in a table |
|
|
Term
|
Definition
the value held in a single table cell |
|
|
Term
|
Definition
an attribute or set of attributes, the values of which occur only once in all the rows of the table |
|
|
Term
|
Definition
the key chosen by a database designer to represent relationships among rows in different tables |
|
|
Term
|
Definition
an attribute that duplicates the primary key of a different (foreign) table |
|
|
Term
Referential Integrity Constraint |
|
Definition
a constraint, stored in the schema, that the DBMS uses to automatically enforce referential integrity |
|
|
Term
|
Definition
a formal technique for evaluating and improving the quality of a relational database schema |
|
|
Term
|
Definition
restriction that all rows of a table must contain the same number of columns |
|
|
Term
|
Definition
a consistent state among foreign key and primary key values |
|
|
Term
|
Definition
a one-to-one association between the values of two attributes |
|
|
Term
|
Definition
restriction that a table is in 1NF and that each non-key attribute is functionally dependent on the entire primary key |
|
|
Term
|
Definition
restriction that a table is in 2NF and that no non-key attribute is functionally dependent on any other non-key attribute |
|
|
Term
|
Definition
the storage format and allowable content of a program variable, class, attribute, or relational database attribute or column |
|
|
Term
|
Definition
a data type supported directly by computer hardware or a programming language |
|
|
Term
|
Definition
combinations of or extensions to primitive data types that are supported by programming languages, operating systems, and DBMSs |
|
|
Term
Single Database Server Architecture |
|
Definition
one or more databases are hosted by a single DBMS running on a single server |
|
|
Term
Replicated Database Server Architecture |
|
Definition
complete database copies are hosted by cooperating DBMSs running on multiple servers |
|
|
Term
Partitioned Database Server |
|
Definition
multiple distributed database servers are used and the database schema is partitioned, with some content on only one server and some content copied on all servers |
|
|
Term
Cloud-Based Database Server Architecture |
|
Definition
use of a cloud computing service provider to provide some or all database services |
|
|
Term
|
Definition
updating one database copy with changes made to other database copies |
|
|
Term
|
Definition
a control that rejects invalid data inputs, prevents unauthorized data outputs, and protects data and programs against accidental or malicious tampering |
|
|
Term
|
Definition
a control that prevents invalid or erroneous data from entering the system |
|
|
Term
|
Definition
a control that checks numeric data input to ensure that the value is reasonable |
|
|
Term
|
Definition
a control that ensures that all required data values describing an object or transaction are present |
|
|
Term
|
Definition
a control that ensures that numeric fields that contain codes or identifiers are correct |
|
|
Term
Field Combination Control |
|
Definition
a control that reviews combinations of data inputs to ensure that the correct data are entered |
|
|
Term
|
Definition
a control that restricts which person or programs can add, modify, or view information resources |
|
|
Term
|
Definition
a technique by which any update to the database is logged with such audit information as user ID, date, time, input data, and type of update |
|
|
Term
|
Definition
a control that prevents errors that can occur when multiple programs try to update the same data at the same time or when recording a single transaction requires multiple related database updates |
|
|
Term
|
Definition
a control that ensures that output arrives at the proper destination and in accurate, current, and complete |
|
|
Term
|
Definition
model of fraud that states that opportunity, motivation, and rationalization must all exist for a fraud to occur |
|
|
Term
|
Definition
a control that protects the assets of an organization from all threats, with a primary focus on external threats |
|
|
Term
|
Definition
the process of identifying users who request access to sensitive resources |
|
|
Term
Multifactor Authentication |
|
Definition
using multiple authentication methods for increased reliability |
|
|
Term
|
Definition
a list attached or linked to a specific resource that describes users or user groups and the nature of permitted access |
|
|
Term
|
Definition
the process of allowing or restricting a specific authenticated user's access to a specific resource based on an access control list |
|
|
Term
|
Definition
a person who isn't allowed access to any part or functions of the system |
|
|
Term
|
Definition
a person who is authorized to access the system |
|
|
Term
|
Definition
a person who has access to the source code, executable program, and database structure of the system |
|
|
Term
|
Definition
the process of altering data so unauthorized users can't view them |
|
|
Term
|
Definition
the process of converting encrypted data back to their original state |
|
|
Term
|
Definition
a complex mathematical transformation that encrypts or decrypts binary data |
|
|
Term
|
Definition
a binary input to the encryption algorithm - typically a long string of bits |
|
|
Term
|
Definition
encryption method that uses the same key to encrypt and decrypt the data |
|
|
Term
|
Definition
security measure that automatically deletes sensitive data from a portable device when unauthorized accesses are attempted |
|
|
Term
Asymmetric Key Encryption |
|
Definition
encryption method that uses different keys to encrypt and decrypt the data |
|
|
Term
|
Definition
a form of asymmetric key encryption that uses a public key for encryption and a private key for decryption |
|
|
Term
|
Definition
a technique in which a document is encrypted by using a private key to verify who wrote the document |
|
|
Term
|
Definition
an institution's name and public key (plus other information, such as address, Web site URL, and validity date of the certificate) encrypted and certified by a third party |
|
|
Term
|
Definition
a widely accepted issuer of digital certificates |
|
|
Term
Secure Sockets Layer (SSL) |
|
Definition
a standard set of methods and protocols that address authentication, authorization, privacy, and integrity |
|
|
Term
Transport Layer Security (TLS) |
|
Definition
an internet standard equivalent to SSL |
|
|
Term
|
Definition
an internet standard for secure transmission of low-level network packets |
|
|
Term
Secure Hypertext Transport Protocol (HTTPS) |
|
Definition
an internet standard for securely transmitting Web pages |
|
|