Chapter Summary

KEY TERMS

  • Basic input output system (BIOS)

  • Blended malware

  • Boot sector virus

  • Brute-force attack

  • Cache

  • Centralized controlled computing

  • Centralized systems

  • Data consistency

  • Data independence

  • Data mining

  • Data recovery

  • Data redundancy

  • Data reuse

  • Data warehouse

  • Decentralized

  • Dictionary attack

  • Distributed

  • DMBS

  • Dynamic random access memory (DRAM)

  • Flooding net

  • Grid computing

  • Hardware segmentation

  • Hierarchical database

  • Knowledge-based systems

  • Logic bomb

  • Macro virus

  • Malware

  • Multi-partite virus

  • Object-oriented

  • Persistence

  • Polymorphic virus

  • Primary key

  • Primary storage

  • Process isolation

  • Random access memory

  • Rapid application development

  • Real memory

  • Referential data integrity

  • Registers

  • Relational database

  • SANs

  • Secondary storage

  • Security control architecture

  • Security controls

  • Semantic ...

Get CISSP Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.