Information Technology Reference
In-Depth Information
. . 1345873.John.Smith
. . 3097905.Sarah.Jones
. . 4060964.Roger.Adams
. Then.to.search.for.the.record.containing.Sarah.Jones,.
you.just.need.to.reapply.the.formula.that.directly.yields.
the.index.key.to.the.record..This.is.much.more.efi-
cient.than.searching.through.all.the.records.until.the.
matching.record.is.found.
Host:. A. large. computer,. running. major. applications. and.
containing. considerable. quantities. of. data. which. is.
contacted.through.a.network.by.subordinate.comput-
ers. (PCs,. terminals,. etc.). for. processing. information..
Smaller.hosts.are.generally.known.as.servers.
Incident Response:. The.ability.to.respond.appropriately.and.
completely.to.any.incidents,.situational.compromises,.
or.threats.from.any.source.at.any.time.
Incursion:. A.penetration.of.the.system.by.an.unauthorized.
source..Similar.to.an.intrusion,.the.primary.difference.
is.that.incursions.are.classed.as. hostile .
Information Asset:. A.deinable.piece.of.information,.stored.
in.any.manner.that.is.recognized.as.valuable.to.the.
organization.. The. information. that. comprises. an.
information.asset.may.be.little.more.than.a.prospect.
name. and. address. ile,. or. may. be. the. plans. for. the.
release. of. the. latest. in. a. range. of. products. to. com-
pete.with.competitors.
.
. Irrespective.of.the.nature.of.the.information.assets,.
they.all.have.one.or.more.of.the.following.characteristics:
.
1.. They. are. recognized. to. be. of. value. to. the.
organization.
.
2.. They.are.not.easily.replaceable.without.cost,.skill,.
time,.resources,.or.a.combination.
.
3.. They. form. a. part. of. the. organization's. corporate.
identity,. without. which,. the. organization. may. be.
threatened.
.
4.. Their.data.classiication.would.normally.be.propri-
etary,.highly.conidential,.or.even.top.secret.
Search WWH ::




Custom Search