BEC 4 Types of Information Systems and Technology Risks and Appendix Flashcards
1
Q
Strategic risk
A
- risk of choosing inappropriate technology
2
Q
Operating risk
A
- risk of doing the right things in the wrong way
3
Q
Financial risk
A
- risk of having financial resources lost, wasted or stolen
4
Q
Information risk
A
- risk of loss of data integrity, incomplete transactions, or hackers
5
Q
Specific risk
A
- Error - carelessness, failure to follow directions or ignorance due to poor training
- Intentional acts - sabotage, embezzlements, viruses, denial of service attacks
- Disasters - fires, floods, earthquakes, high winds, terrorism and war
6
Q
Virus
A
- a piece of a computer program that inserts itself into some other program, including operating systems to propagate.
- It requires a host program to propagate and can’t run independently
7
Q
Worm
A
- a program that can run independently and normally propagates itself over a network
- it can’t detach itself to other programs
8
Q
Trojan horse
A
- a program that appears to have a useful function but contains a hidden and unintended function that presents a security risk
9
Q
Denial of Service attack
A
- one computer bombards another computer with a flood of information intended to keep legitimate users from accessing the target computer or network
10
Q
Phishing
A
- sending of phony emails to try to lure people to phony websites asking for financial information
11
Q
Spam
A
unsolicited email
12
Q
Risk assessment and control activities
A
- Risk - possibility of harm or loss
- Threat - any eventuality that represents a danger to an asset or a capability linked to hostile intent
- Vulnerability - characteristic of a design, implementation or operation that renders the system susceptible to a threat
- Safeguards and controls - policies and procedures that when effectively applied, reduce or minimize vulnerabilities
13
Q
Risk assessment
A
- identify risks
- evaluate the risks in terms of the probability of occurrence
- evaluate the exposure of potential loss
- identify controls
- evaluate the costs and benefits of implementing the controls
- implement the controls that are cost effective
14
Q
Evaluation and Types of controls
A
- evaluated on cost/benefit basis
15
Q
Access controls
A
- Physical access
a. User identification codes
b. File attributes - Assignment and maintenance of security levels
- Callback on dial up systems
- File attributes
- Firewalls
a. firewalls deter
b. network firewalls
c. application firewalls
d. firewalls methodologies
- packet filtering - examines packets of data as they pass via the firewall according to the rules. Firewall configuration
- circuit level gateways - allow data into a network that result from requests from computers inside the network
- application level gateways - examine data coming into the gateway in a more sophisticated fashion
16
Q
Disaster recovery
A
consists of an entity’s plans for continuing operations in the event of the destruction of not only program and data files, but also processing capabilities.
17
Q
Major players in disaster recovery
A
- organization itself
- external service provider,
the disaster recovery services provider
18
Q
Steps in disaster recovery
A
- assess the risks
- identify mission critical applications and data
- develop a plan for handling applications
- determine the responsibilities of the personnel involved
- test the disaster recovery plan
19
Q
Advantages and disadvantages of disaster recovery and business continuity
A
- without the plan, the company may be out of business