4-3. Protection of Information Flashcards

1
Q

Mobile device: What are examples? Benefits?

A

iPhones, androids, blackberries, tablet computers.

Benefits: Ubiquitous computing - universal data availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mobile device: risks?

A
  • User-installed applications can create security risks (e.g. spyware)
  • Loss or theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mobile device: challenges?

A
  • Redesigning displays, ensuring functionality across platforms, etc
  • Emerging technologies: Siri, Movie her, voice recognition/input, biometric identification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mobile device: what is SDLC?

A

System development life cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mobile device: what are end-user system development risks?

A
  • No knowledge or application of SDLC
  • Inadequate system testing and documentation
  • Poor data controls
  • Poor integration with existing systems
  • Poor system design
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mobile device: end-user system development risks: what is the responses?

A

Software and program development and implementation

  • third-party review and testing of user-developed programs
  • catalog and store programs in secure and off-site location

Segregation of duties

  • third-party review of data entry (if any) and report production
  • implement additional supervision and review as feasible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SBE?

A

Small business environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SBE: what are end-user computing risks?

A
  • Hard to control

* Higher risk of errors, defalcation, system failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SBE: characteristics?

A
  • Exclusively microcomputers
  • No centralized info. Technology (IT) dept often outsourced
  • Poor segregation of duties (incompatible functions often combined)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SBE: computing risks and responses?

A

Risk: Unprotected computing sites
Response: Give > attention to locked doors and secure storage (e.g. CDs, DVDs, flash drives)

Risk: Logical (electronic) access
Response: Require usernames and strong passwords, automatic log out after unused period

Risk: Data backup
Response: Outsource, or establish and enforce policies (e.g. centralized and automate through network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SBE: what is a compensating control?

A

Close involvement of knowledgeable owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile device: what items should be included in mobile applications training?

A
  • Organizational policies
  • Password maintenance and protection
  • When and how to use mobile devices
  • Procedures for lost or stolen devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mobile device: definition?

A

Transportable (ubiquitous) computing devices; that is, computing devices that can be carried from place to place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 3 approaches to consolidate data from multiple locations?

A
  1. Centralized system: data and processing at central location, user access via telecommunications channel
  2. Decentralized system: individual location processing and data, summarized data sent to central office, use is declining
  3. Distributed (hybrid) database system: distribute to locations according to need, seeks the best of centralized and decentralized, increasingly common
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Centralized system: Advantages and disadvantages?

A

A: enables better data security, consistency in processing
D: high transmission costs, input/output bottlenecks at high traffic times (end of period), slow response to information requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Decentralized system: Advantages and disadvantages?

A

A: lower transmission cost, lower processing power/storage needs at central site, lower input/output bottlenecks, higher response to local needs
D: higher data redundancy and poor information integration, higher security issues, higher hardware costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Distributed database system: Advantages and disadvantages?

A

A: better communication between locations (all connected to distributed database), more current and complete info, reduce or eliminate need for expensive central processing center
B: similar to centralized systems, cost of communications among locations, access and update conflicts among locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are computer networks?

A

2 or more computing devices; Connected by a communications channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is node?

A
  • Network access point

* A connected devices (computers, printers, headphones, etc) identified by type (linked to device protocols)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is critical about nodes and security?

A

Controlling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does node also could measure?

A

Measure of network complexity (e.g. 5 vs 30,000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is assigned to node?

A

A DNS and IP (internet protocol) address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is DNS?

A

Domain name system: translates network node into IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does network monitors do in relation to node?

A

Network monitors display node activity - status, extent of traffic, alarms (e.g. prohibited traffic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Computer network: what are components?

A
  • Switch (0,1) and/or router - router is increasingly common.
  • Network Interface Card (NIC) or Network Adapter Card (NAC)
  • Transmission media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Computer network: Describe switch and/or router.

A
  • Route traffic and may include security features.

* Routers are smarter, more complex and cost more than switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Computer network: describe Network Interface Card (NIC) or Network Adapter Card (NAC).

A
  • Circuit board and software on each node
  • Translate between network and computer language
  • Matches to transmission media
    e. g. in each computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Computer network: describe transmission media.

A
  • Communication link between nodes (here a cable)

* May be wired or wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Computer network: what are types of nodes?

A
  • Client

* Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Computer network: describe client node.

A
  • Usually an end user’s microcomputer

* Uses but does not provide network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Computer network: describe server node.

A

*Provide services or resources to network
*End-users access server resources but generally don’t use directly
*Server may lack keyboard and video (access through network)
E.g. a file server maintains centralized application and data files.
A printer server provides access to high quality printers

32
Q

Computer network: What are types of networks?

A
  • Local Area Networks (LANs)
  • Wide Area Networks (WANs)
  • Storage Area Networks (SANs)
  • Personal Area Networks (PANs)
33
Q

Computer network: describe LANs.

A
  • use dedicated communication lines (i.e. used only by the network)
  • cover limited area
34
Q

Computer network: describe WANs.

A

*use public or shared communication lines (e.g. telephone lines, television cables)

35
Q

Computer network: describe SANs.

A
  • type of LAN
  • dedicated: connected storage devices to servers and other devices
  • centralize data storage
  • increasing use in cloud computing
36
Q

Computer network: describe PANs.

A
  • create/used by individual person
  • wireless: e.g. use Bluetooth (or IrDA) to connect a device (e.g. iPad) to keyboard, headset, mouse, another computer, etc
  • wired: use fiber optics, twisted pair, coax or other cable (e.g. Apple) to connect
37
Q

Computer network: why necessary?

A
  • File and data sharing/resources
  • Email
  • Printing
  • Remote access
  • Directories (locate services on the network)
38
Q

Computer network: what are types of communication media?

A
  • Wired: twisted pair (copper), coaxial cable, fiber optic cable
  • Wireless: microwave transmission, Wi-Fi or spread-spectrum radio transmission, Bluetooth, digital cellular
39
Q

Computer network: wired: what are twisted pair?

A
  • Originally for phone connections
  • Historically, slowest, least secure (e.g. easy to tap), lowest capacity, most interference of wired media (EMI=electromagnetic interference)
  • Low cost and common in US buildings (rapidly being replaced)
40
Q

Computer network: wired: what is coaxial cable?

A
  • Cable for your wired cable TV system
  • Faster, more secure, moderate capacity, less subject to interference
  • Slightly higher cost, common due to cable TV systems
41
Q

Computer network: wired: what are fiber optic cable?

A
  • Fast and secure, high capacity
  • Light pulses not electrical impulses; no electrical interference, no degradation over long distances
  • More expensive and often not already in US buildings
42
Q

Computer network: wireless: what are microwave transmission?

A
  • Use of terrestrial microwave and/or satellite microwave transmission
  • Primarily used in WANs
43
Q

Computer network: wireless: what are Wi-Fi or spread-spectrum radio transmission?

A
  • Used in both large commercial networks and small home networks
  • Used in LAN and also to provide access to WANs
  • Currently: Wi-Fi connections often slower than wired coaxial systems
  • (Ethernet) or fiber optic cable
44
Q

Computer network: wireless: what are Bluetooth?

A
  • A wireless communication protocol
  • Same radio frequencies as Wi-Fi
  • Lower power consumption and weaker connection; (10 meter range)
  • Provide direct communication link between 2 devices (e.g. headset and cell phone)
  • Used in personal area networks (PANs)
  • E.g. cell phone receiving signal from GPS
45
Q

Computer network: what are advantages of wireless and wired network?

A

Wireless: Scalable, flexible, often lower cost, mobility
Wired: Reliable, security, speed, occasionally lower cost

Large LANs and WANs often include both

46
Q

Computer network: what are 3 types of ownerships?

A

Private, public, cloud computing/cloud services.

47
Q

Computer network: describe private ownership, pros/cons.

A

Small number of applications or restricted set of users.
A: Secure, flexible, performance exceeds that of public
D: Costly

48
Q

Computer network: describe public ownership, pros/cons.

A

*Owned by third-party companies and leased to users.
*Access is typically through dial-up circuits (e.g. what is used at Starbucks, McDonalds, etc).
*Exploding use
A and D: Opposite of private networks

49
Q

Computer network: what are management tools for control?

A
  1. Response time reports
  2. Downtime reports
  3. Online monitors
  4. Network monitors
  5. Protocol analyzers
  6. Simple network management protocol (SNMP)
  7. Help desk reports
50
Q

What is Internet?

A
  • A “network of networks”
  • Global network of billions of interconnected computers and networks
  • World’s largest client-server network
51
Q

Internet: what are 2 common protocols?

A

*TCP (transmission control protocol)
*IP (Internet Protocol): All nodes assigned an IP address for delivery of information
These are core protocol transmission on the Internet

52
Q

Internet: what is protocol?

A

Rules by which a network operates and controls flow and priority of messages.

53
Q

Internet: what is packet (or block)?

A

Meanings by which information is transmitted.

e.g. sent files are broken into packets.

54
Q

Internet: what does each packet contains?

A
  • Header: routing info (address), length, protocol (maybe), originating info
  • Data
  • Trailer: used in some systems, error detection bits, end of message identifier
55
Q

Internet: what are most heavily used internet feature (in organizations)?

A
  • Email

* TCP

56
Q

Internet: what are 2 components of email?

A
  1. Mail servers: host that deliver, forward and store mail

2. Clients: link users to servers. Allow you to read, compose, send, and store email

57
Q

Internet: what does TCP do?

A

Breaks up sent messages into IP packets

*Sent to a router(s) (sort of an internet postman - delivers packets) and delivered

58
Q

Internet: what is url?

A

uniform resource locator.

Web address of a resource: e.g. the part after http://

59
Q

Internet: what does browser do?

A

*Translates the url to an ip address
*Sends request for URL via HTTP: e.g. “http://” says use the HTTP protocol, “https://” says use a protocol with great (SSL) security.
could use “telnet://” - use telnet protocol to remote connect

60
Q

Internet: what is HTTP?

A

Hypertext transfer protocol.

61
Q

Internet: what are protocols and services?

A
  • Simple Mail Transfer Protocol (SMTP): for email services
  • Internet Message Access Protocol (IMAP): permits access to remote mailboxes (e.g. on a server) as if they were local (e.g. on a client system)
  • File Transfer Protocol (FTP): for uploading and downloading files
  • Instant Messaging (IM): common for informal, internal corporate communications
  • Voice over IP (VoIP): for internet-based phone communications
62
Q

Internet: what is Markup (or Tagging) languages?

A

Codes that indicate how parts of a file are to be processed or displayed.

63
Q

Internet: what is html?

A

Hypertext markup language: core makeup language (way of tagging text for display) for web pages and the basic building-block protocol for constructing webpages.

64
Q

Internet: what is XML?

A

Extensible markup language: for encoding (tagging) documents in machine-readable form.

65
Q

Internet: what is XBRL?

A

Extensible business reporting language: XML based - for encoding and tagging business information such as financial information.

  • Used in fillings with SEC on EDGAR
  • Some companies now report FS in both paper and XBRIL formats
66
Q

Internet: security: what monitoring employee use entails?

A
  • Detect and/or prevent unauthorized uses: non-work tasks (shopping), legal issues (e.g. child pornography, gaming)
  • National security/political control (China, Egypt, U.S.)
  • Packet sniffers (view and capture sent info)
  • Desktop surveillance (keystroke and website logging): e.g. Wavecrest
67
Q

Internet: what does ISP do?

A

Internet Service Providers provide access through;

  • direct connections to Internet backbone (high speed, high capacity communications line)
  • e.g. insight cable, Wind stream
68
Q

Internet: what are intranets and extranets?

A

Private (e.g. limited access) network built using Internet protocols

  • Allows access to network resources through web browsers rather proprietary interface
  • Reduces training and system development time
  • Rapidly replacing traditional proprietary LANs and WANs
  • Easier to use, greater security
  • Internet portal - the entry site (URL) for an intranet
69
Q

Internet: Describe intranets.

A

Available only within an organization (business, school, association).
Often used to connect geographically separate LANs within a company.

70
Q

Internet: Describe extranets.

A

Extend intranet to associates.

E.g. suppliers, customers, business partners. Extended beyond the company “firewall”

71
Q

Internet: what is often used to extend an intranet to an extranet?

A

Use VPN (virtual private network) technology to secure communications.

72
Q

Internet: what is Web 2.0?

A

2nd generation, web-based collaboration and community-generated content.

73
Q

Internet: what are tools for Web 2.0?

A
  • Blogs: focused discussion or (b)log led by a moderator (share ideas and opinions)
  • Wiki: knowledge-sharing collaborative website
  • Twitter: micro-variation of a blog with 140 character limit. Often “follow” friends and celebrities
  • RSS (really simple syndication)/ATOM feeds: news and info source by (free) subscription
74
Q

What does repeaters do?

A

Strengthen the signal.

75
Q

What does Gateways do?

A

Gateways connect Internet computers of dissimilar networks.