Strategic risk analysis {Ans: security policies are translated into mechanisms which support information security. We will focus on the risk management process}Peripheral devices {Ans: components that are located outside the system unit yet are connected physically or wirelessly to it}Compiler {Ans: requires that the components of the software all be defined before compilation can begin to run all at once. Examples are C, C++, C#.}Internet of Things {Ans: refers to the myriad types of devices that can and will be connected to the Internet in the next few years.}Database administrator {Ans: focus on the design, development, and support of database management systems (DBMSs). Tasks will include installation, maintenance, performance analysis, and troubleshooting as with the other administrative areas}hot storage {Ans: a physical location where an organization can move its operations. A hot storage includes everything for normal business operations, including HVAC systems, hardware, software, and backed-up data. Hot storages allow for the quickest return to business (often without any delay), but they are expensive.}Project Management Life Cycle {Ans: initiation, planning, execution, closure}Electronic Communication Privacy Act of 1986 {Ans: Establishes regulations and requirements to perform electronic wiretapping over computer networks (among other forms