MIS 303 Study Guide - Final Guide: Public-Key Cryptography, Smart Card, Unique Key

30 views17 pages

Document Summary

Mis 303 final exam study guide: before midterm: the second line of defense technology. 3 primary information security areas: authentication and authorization (people, authentication: a method to confirm a user"s identity. If prevention and resistance strategies fail and there is a security breach, an organization can use detection and response technologies to mitigate the damages. Database management system (dbms): software through which users and application programs interact with a database. Information redundancy the duplication of data or storing the same information in multiple places: redundant data can cause storage issues along with data integrity. Information integrity: a measure of the quality of information. Integrity constraints: rules that help ensure the quality of information. Increased information security: databases offer several security features, password provides authentication of the user, access level determines who has access to the different types of information, database design. Instances: an entity consists of multiple instances, aka records or rows.