expand for answer

Online analytical processing (OLAP)

The manipulation of information to support decision making.


Similar items:
A channel that conveys information by altering the performance of a system component or modifying a resource’s timing in a predictable manner. A covert channel in which one process signals information to another by modulating its own use of system resources in such a way that this manipulation affects the real response time observed by the second process. Covert channel in which one process signals information to another process by modulating its own use of system resources (e. g. , central processing unit time) in such a way that this manipulation affects the real response time observed by the second process.
[view]
Attribute of an information system when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system. The attribute of an IS when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
[view]
A data manipulation language (DML) provides the necessary commands for all database operations, including storing, retrieving, updating, and deleting database records. The database programming language that allows users to interact with the data contained within the schema.
[view]
The capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same. Forces attain information superiority through the acquisition of systems and familiesofsystems that are secure, reliable, interoperable, and able to communicate across a universal information technology (IT) infrastructure, to include National Security Systems (NSS). This IT infrastructure includes the data, information, processes, organizational interactions, skills, and analytical expertise, as well as systems, networks, and information exchange capabilities.
[view]
Notification of significant new trends or developments regarding the threat to the information system of an organization. This notification may include analytical insights into trends, intentions, technologies, or tactics of an adversary targeting information systems.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in