Business 4: Types of Info Systems and Tech Risks Flashcards
What are the four main risks w/r/t systems?
1) Strategic risk
2) Operating risk
3) Financial risk
4) Information risk
What are the four main risks w/r/t systems?
1) Strategic risk
2) Operating risk
3) Financial risk
4) Information risk
What does strategic risk include w/r/t systems?
Risk of choosing inappropriate technology
What does operating risk include w/r/t systems?
risk of doing the right things in the wrong way
What does financial risk include w/r/t systems?
risk of having financial resources lost, wasted, or stolen
What does information risk include w/r/t systems?
risk of loss of data integrity, incomplete transactions, or hackers
What does information risk include w/r/t systems?
risk of loss of data integrity, incomplete transactions, or hackers
Can a virus run independently?
No
What is a virus?
Piece of a computer program that inserts itself into some other program to propagate and cause harm to files and programs
Can a worm run independently?
Yes
What do you call a program that can run independently and normally propagates itself over a network?
Worm
Can a worm attach itself to other programs?
No
Can a worm attach itself to other programs?
No
Does a Trojan horse normally replicate itself?
No
What is a Trojan horse?
Program that appears to have a useful f(x) but contains a hidden and unintended f(x) that presents a security risk
What is a Trojan horse?
Program that appears to have a useful f(x) but contains a hidden and unintended f(x) that presents a security risk
What do you call it when one computer or group of computers bombard another computer with a flood of network traffic?
Denial-of-Service Attack
What do you call it when one computer or group of computers (zombies) bombard another computer with a flood of network traffic?
Denial-of-Service Attack
What do you call it when one computer or group of computers (zombies) bombard another computer with a flood of network traffic?
Denial-of-Service Attack
What is phishing?
- Sending of phony emails to try to lure people to phony websites
- Where they are asked for info that will allow the phisher to impersonate the user
What is phishing?
- Sending of phony emails to try to lure people to phony websites
- Where they are asked for info that will allow the phisher to impersonate the user
Define risk
Possibility of harm or loss
Define threat.
Any eventually that represents a danger to an asset or a capability linked to hostile intent
What is the term for a characteristic of a design, implementation, or operation that renders the system susceptible to a threat?
Vulnerability