AIS Test 2 Flashcards
Sabotage
Intentional act where the intent is to destroy a system or some of its components.
Cookie
Text file created by a website and stored on a visitor’s hard drive. Cookies store information about who the user is and what the user has done on the site.
Fraud
Any and all means a person uses to gain an unfair advantage over another person.
White-Collar Criminals
Typically, business people who commit fraud. White-collar criminals usually resort to trickery or cunning, and their crimes usually involve a violation of trust or confidence.
Corruption
Dishonest conduct by those in power which often involves actions that are illegitimate, immoral, or incompatible with ethical standards. Examples include bribery and bid rigging.
Investment Fraud
Misrepresenting or leaving out facts in order to promote an investment that promises fantastic profits with little or no risk. Examples include Ponzi schemes and securities fraud.
Misappropriation of Assets
Theft of company assets by employees.
Fraudulent Financial Reporting
Intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements.
Pressure
Person’s incentive or motivation for committing fraud.
Opportunity
Condition or situation that allows a person or organization to commit and conceal a dishonest act and covert it to personal gain.
Lapping
Concealing the theft of cash by means of a series of delays in posting collections to accounts receivable.
Check Kiting
Creating cash using the lag between the time a check is deposited and the time it clears the bank.
Rationalization
Excuse that fraud perpetrators use to justify their illegal behavior.
Computer Fraud
Any type of fraud that requires computer technology to perpetrate.
Time-Based Model of Security
Implementing a combination of preventive, detective, and corrective controls that protect information assets long enough to enable an organization to recognize that an attack is occurring and take steps to thwart it before any information is lost or compromised.
Defense-In-Depth
Employing multiple layers of controls to avoid a single point-of-failure.
Social Engineering
Using deception to obtain unauthorized access to information resources.
Authentication
Verifying the identity of the person or device attempting to access the system.
Biometric Identifier
A physical or behavioral characteristic that is used as an authentication credential.
Multifactor Authentication
Use of two or more types of authentication credentials in conjunction to achieve a greater level of security.
Multimodal Authentication
Use of multiple authentication credentials of the same type to achieve a greater level of security.
Authorization
Process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform.
Access Control Matrix
Table used to implement authorization controls.
Compatibility Test
Matching the user’s authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action.
Penetration Test
Authorized attempt to break into the organization’s information system.
Change Control and Change Management
Formal process used to ensure that modifications to hardware, software, or processes do not reduce systems reliability.
Border Router
Device that connects an organization’s information system to the internet.
Firewall
Special purpose hardware device or software running a general purpose computer that controls both inbound and outbound communication between the system behind the firewall and other networks.
Demilitarized Zone (DMZ)
Separate network located outside the organization’s internal information system that permits controlled access from the internet.
Routers
Special purpose devices that are designed to read the source and destination address fields in IP packet headers to decide where to send (route) the packet next.
Access Control List (ACL)
Set of IF-THEN rules used to determine what to do with arriving packets.
Packet Filtering
Process that uses various fields in a packet’s IP and TCP headers to decide what to do with the packet.
Deep Packet Inspection
Process that examines the data in the body of a TCP packet to control traffic, rather than looking only at the information in the IP and TCP headers.
Intrusion Prevention Systems (IPS)
Software or hardware that monitors patterns int he traffic flow to identify and automatically block attacks.
Endpoints
Collective term for the workstations, servers, printers, and other devices that comprise an organization’s network.
Vulnerabilities
Flaws in programs that can be exploited to either crash the system or take control of it.
Vulnerability Scanners
Automated tools designed to identify whether a given system possesses any unused and unnecessary programs that represent potential security threats.
Exploit
Program designed to take advantage of a known vulnerability.
Patch
Code released by software developers that fixes a particular vulnerability.
Patch Management
Process of regularly applying patches and updates to software.
Hardening
Process of modifying the default configuration of endpoints to eliminate unnecessary settings and services.
Log Analysis
Process of examining logs to identify evidence of possible attacks.
Intrusion Detection Systems (IDS)
System that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions.
Computer Incident Response Team (CIRT)
Team that is responsible for dealing with major security incidents.
Virtualization
Running multiple systems simultaneously on one physical computer.
Cloud Computing
Using a browser to remotely access software, data storage, hardware, and applications.
Threat/Event
Any potential adverse occurrence or unwanted event that could injure the AIS or the organization
Exposure/Impact
Potential dollar loss should a particular threat become a reality.
Likelihood/Risk
Probability that a threat will come to pass.
Internal Controls
Processes and procedures implemented to provide reasonable assurance that control objectives are met.
Preventive Controls
Controls that deter problems before they arise.
Detective Controls
Controls designed to discover control problems that were not prevented.
Corrective Controls
Controls that identify and correct problems as well as correct and recover from the resulting errors.