B4-Types of Information Systems and Technology Risks Flashcards
1
Q
Four Categories of Risk
A
A. Strategic Risk-risk of choosing inappropriate technology
B. Operating Risk-risk of doing the right things in the wrong way. ie-Payroll. New employees. Make sure to set up employees first in system and than pay everyone. not the other way around.
C. Financial Risk-risk of having financial resources lost, wasted, or stolen.
D. Information Risk-risk of loss of data intregrity, incomplete transactions, or hackers. s
2
Q
Specific Risks
A
- Errors-unintentional (carelessness, failure to follow directions, ignorance due to poor training)
- Intentional Acts-sabotage, embezzlements, viruses, denial of service attacks, or other types of computer fraud.
- Disasters-fires, floods, earthquakes, high winds, terrorism, and war.
3
Q
Threats in a computerized environment
A
- Virus-piece of a computer program that inserts itself into some other program, including operating systems, to propagate and cause harm to files and programs. Requires a host program to propagate and cannot run independently.
- Worm-is a program (and a special type of virus) that can run independently and normally propagates itself over a network. It cannot attach itself to other programs.
- Trojan Horse-is a program that appears to have a useful function but contains a hidden and unintended function that presents a security risk. Normally does not replicate itself.
- Denial-of-Service Attack-one computer or group of computers bombards another computer with a flood of network traffic.
- Phishing-sending of phone e-mails to try and lure people to phony websites where they are ask for information that will allow the phisher to impersonate the user.
4
Q
Risk Assessment and Control Activities
A
- Risk-possibility of harm or loss
- Threat-respresents a danger to an asset or a capability linked to hostile intent
- Vulnerability-a characteristic of a design, implementation, or operation that renders the system susceptible to a threat
- Safeguards and Controls-policies and procedures that, when effectively applied, reduce or minimize vulnerabilities.
5
Q
Access Controls
A
- Physical Access-ids, key cards, keypads
- Electronic Access-built into hardware and software to prevent and restrict who can get in and who cant
a. User identification codes
b. File-Level Access Attributes-restrictions placed on a specific file-like read only
c. file attributes-set to restrict writing, reading, and/or directory privileges
d. Firewall-system of hardware and software of user identification and authentication that prevents unauthorized users from gaining access to network resources. The firewall acts as a “gatekeeper” by isolating a private network from a public network.