Business informatics Flashcards
What is a communication protocol?
Set of rules that governs data communication and are required to exchange messages in and between computing systems.
Why do we need com. protocols?
To create consistency & universality for sending & receiving messages. Examples: File transfer protocol (FTP); TCP/IP; Hypertext Transfer Protocol (HTTP); SIMPLE MAIL TRANSFER (SMTP)
Protocols can address properties as?
Transmission Speed, Flow control, Product size
What is LAN tech. other than ethernet and token ring?
Asynchronous Transfer Mode (ATM) goal of transporting real-time voice, video, text, graphics & offers full array of network service
Fiber Distribution Data Interface (FDDI) : Dual ring network using a token scheme with many similarities
Weak points of TCP/IP
Fail to represent any other protocol stock than TCP/IP suitable = not generic (Cannot describe Bluetooth)
Originally designed and implemented for WAN and not for LAN/PAN
Hackers can gain access to the source path of information and modify route options. Further TCP Blindspooting
Quantum Computing
Excels all types of problem solving, but requires rethinking of current software systems. Based on QUBITS= Has many more states than 0/1s, contains an infinite amount of information. Follows mores law.
Can improve solar panels, drug discovery and computing power
Could trim computing times- therefore provide huge cuts in costs of cloud services or big data
What is vulnerability?
The inability to withstand the effects of a hostile environment. Weaknesses in software/hardware being exposed to harmful intruders.
What is system vulnerability?
Weakness in the system which can be exploited by a threat –> attackers that gain access to a system and cross privilege boundaries.
What are sources for system vulnerabilities?
Design flaws, Poor security mgmt, social engineering, incorrect implementation, internet vulnerability
Best ways to identify system vulnerabilities?
Penetration Test: Companies authorize/ hire hackers to infiltrate their system and therefore expose potential weaknesses/ vulnerabilities.
Audits: Often consultants, create a detailed report of all security issues -> bird’s eye view
Software solutions: continuous security monitoring. use of software security tools -> vulnerability scans network in the search for weaknesses
What is innovative misuse?
Tech trends that introduce new methods and ideas to corrupt/ misuse new technologies like Smart home devices, facial recognition, AI Cloning.
e.g. fully automated attack technology through the use of ML tech.
What role does it play in the search for solutions? (innovative Misuse)
users dependent on the internet, used for many crucial applications therefore one minor attack has the potential to cause huge damage. Further increased time to discover and analyze attack mechanisms
What is incomplete implementation?
Often the result of incompatible interfaces. 2 products can only be deployed and work together if they are compatible. That means modules must be additive.
Vast number of variables (hardware/software) = not possible to test all combinations and the budget for IT transformation is often insufficient
What is social engineering?
Hackers use manipulation and psychological tricks to gain access to computer systems, to receive passwords , personal information etc. of individuals
Why is it such a big issue (social engineering)
Users have become increasingly dependent on the internet, using it for almost every critical application.
Further, the enormous growth of the internet leads to millions of vulnerable computers.