Term
|
Definition
an integrated collection of stored data that is centrally managed and controlled |
|
|
Term
Database management (DBMS) |
|
Definition
A system software component that manages and controls one or more databases |
|
|
Term
|
Definition
databases component that stores the raw bits and bytes of data |
|
|
Term
|
Definition
Database component that contains descriptive information about the data stored in the physical data store |
|
|
Term
relational database management system (RDMS) |
|
Definition
a DBMS that organizes data in tables or relations |
|
|
Term
|
Definition
A two dimensional data structure of columns and rows |
|
|
Term
|
Definition
one horizontal group of data attribute values in a table |
|
|
Term
|
Definition
one vertical group of data values in a table |
|
|
Term
|
Definition
An attribute or set of attributes, the values of which occur only in all the rows of the table |
|
|
Term
|
Definition
the key chosen by a database designer to represent relationship among rows in different tables |
|
|
Term
|
Definition
an attribute that duplicates the primary key of a different or foreign table |
|
|
Term
|
Definition
a consistent state among foriegn key and primary key values |
|
|
Term
Referential integrity constraint |
|
Definition
a constraint stored in the schema that the dbms uses to automatically enforce referental integrity |
|
|
Term
|
Definition
a formal technique for evaluating and improving the quality of a relational database schema |
|
|
Term
|
Definition
restriction that all rows of a table must contain the same number of columns |
|
|
Term
|
Definition
a one to one association between the value of two attributes |
|
|
Term
|
Definition
restriction that a table is in 1nf and that each non key attribute is functionally dependant on the entire primary key |
|
|
Term
|
Definition
restriction that a table is in 2NF and that no non key attribute is functionally dependant on any other non key attribute |
|
|
Term
|
Definition
A data type supported directly by computer hardware or programming language |
|
|
Term
|
Definition
combination of or extensions to primitive data types that are supported by programming language operating systems and DBMS |
|
|
Term
Single database server architecture |
|
Definition
one or more databases are hosted by a single DBMS running on a single server |
|
|
Term
Replicated Database server architecture |
|
Definition
complete database copies are hosted b cooperating DBMS running on multiple servers |
|
|
Term
Partitioned Database Server architecture |
|
Definition
multiple distributed database servers are used and the database schema is partitioned with some content on only one server and some content copied on all servers |
|
|
Term
Cloud database server architecture |
|
Definition
user of a cloud computing service provider to provide some or all database services |
|
|
Term
|
Definition
updating one database copy with changes made to other database copies |
|
|
Term
|
Definition
a control that prevents invalid or erroneous data from entering the system |
|
|
Term
|
Definition
a control that checks numeric data input to ensure that the value is reasonable |
|
|
Term
|
Definition
a control that ensures that all required data value describing an object or transaction are present |
|
|
Term
|
Definition
a control that ensures that numeric fields that contain codes or identifiers are correct |
|
|
Term
Field combination control |
|
Definition
a control that reviews combinations of data inputs to ensure that the correct data are entered |
|
|
Term
|
Definition
A control that restricts which persons or programs can add modify or view information resources |
|
|
Term
|
Definition
a technique by which any update to the database is logged with such audit information as user ID date time input data and type of update |
|
|
Term
|
Definition
a control that prevents errors that can occur when multiple programs try to update the same data at the same time or when recording a single transaction requires multiple related database updates |
|
|
Term
|
Definition
a control that ensures that output arrives at the proper destination and is accurate current and complete |
|
|
Term
|
Definition
model of fraud that states that opportunity motivation and rationalization must all exist for a fraud to occur |
|
|
Term
|
Definition
a control that protects the assets of an organization from all threats with a primary focus on external threats |
|
|
Term
|
Definition
the process of identifying users who request access to sensitive resources |
|
|
Term
Multifactor authentication |
|
Definition
using multiple authentication methods for increased reliability |
|
|
Term
|
Definition
list attached or linked to a specific resource that describes uses or user groups and the nature of premitted access |
|
|
Term
|
Definition
the process of allowing or restricting a specific authenticated users access to a specific resources bases on an access control list |
|
|
Term
|
Definition
a person who isnt allowed access to any part or functions of the system |
|
|
Term
|
Definition
a person who is authorizes to access the system |
|
|
Term
|
Definition
a person who has access to the source code executable program and database structure of the system |
|
|
Term
|
Definition
the process of altering data so unauthroized users cant view them |
|
|
Term
|
Definition
the process of converting encrypted data back to their original state |
|
|
Term
|
Definition
a complex mathematical transformation that encrypts or decrypts binary data |
|
|
Term
|
Definition
a binary input to the encryption algorithm typically a long string of bits |
|
|
Term
|
Definition
encryption method that uses the same key to encrypt and decrypt the data |
|
|
Term
|
Definition
security measure that automatcally deletes sensitive data from a protable device when unauthorized access are attempted |
|
|
Term
asymmetric key encryption |
|
Definition
encryption method that uses different keys to encrypt and decrypt the data |
|
|
Term
|
Definition
a form of asymmetric key encryption that uses a public key for encryption and a private key for decryption |
|
|
Term
|
Definition
a technique in which a document is encrypted by using a private key to verify who wrote the document |
|
|
Term
|
Definition
an institutions name and public key plus other info such as address website url and validity date of the certificate encrypted and certified by a third party |
|
|
Term
|
Definition
a widely accepted issuer of digital certificates |
|
|
Term
|
Definition
a standard set of methods and protocals that address authentication authorization privacy and integrity |
|
|
Term
|
Definition
an internet standard equivalent to SSL |
|
|
Term
|
Definition
an internet standard for secure transmission of low level network packets |
|
|
Term
Secure hypertext transport protocal HTTPS |
|
Definition
an internet standard for security transmitting web pages |
|
|