Supplemental Chapter D

Supplemental Chapter D - End of Chapter Materials and...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: End of Chapter Materials and Suggested Solutions Supplement Chapter D-Page Accounting, Information Technology, and Business Solutions 2/e by Hollander, Denna, and Cherrington Review Questions R1. Define each of the terms in the above Checklist of Key Terms and Concepts . Key Term or Concept Definition Access control lists (ACL) Access Control Lists are typically comprised of a list of principals, a list of resources, and a list of permissions. Access control matrix The access control matrix identifies the functions each user can perform once they gain access to the computer. Access controls Access controls restrict unauthorized access to the system itself, to physical devices, and to data in the system. Address spoofing Address spoofing is an attack where the attacker steals a legitimate network (e.g., IP) address of a system and uses it to impersonate the system that owns the address. Application documentation Application documentation describes the inner workings of an application. Application documentation includes a flowchart of program logic as well as written explanations about the computer program itself. Application gateway firewall Application gateway firewall is a type of firewall system that runs an application, called a proxy that acts like the server to the Internet client. The proxy takes all requests from the Internet client and, if allowed, forwards them to the Intranet server. Application gateways are used to make certain that the Internet client and the Intranet server are using the proper application protocol for communicating. Popular proxies include Telnet, ftp, and http. Building proxies requires knowledge of the application protocol. Application program change logs Application program change logs document modifications to application programs. They often include information such as the date, type of changes, programmer(s), and authorizing individual. Asymmetric algorithm Asymmetric algorithm is an encryption algorithm that requires two different keys for encryption and decryption. These keys are commonly referred to as the public and private keys. Asymmetric algorithms are slower than symmetric algorithms. Furthermore, speed of encryption may be different than the speed of decryption. Generally asymmetric algorithms are either used to exchange symmetric session keys or to digitally sign a message. RSA, RPK, and ECC are examples of asymmetric algorithms. Backup system components Backup system components (e.g., extra disk storage devices, extra printers, and extra communication channels) are available so that if a component fails, processing can quickly be transferred to another component without interrupting the flow of processing for an extended period of time....
View Full Document

This note was uploaded on 02/05/2011 for the course ACCOUNTING 361 taught by Professor Anand during the Fall '09 term at George Mason.

Page1 / 24

Supplemental Chapter D - End of Chapter Materials and...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online