Ch 13 Flashcards

1
Q

Why should general managers be concerned with information security?

A

Security, privacy, and ethics are critical to a firm’s success, and delegating them solely to IT professionals can lead to vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key components of IT risk management?

A

Risk Assessment: Identifying and measuring security risks.

Risk Mitigation: Developing strategies to counter risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the principal cybersecurity threats?

A

Internal Threats: Intentional malicious behavior and careless employee actions.

External Threats: Hacking, phishing, malware, and social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three key components of information security?

A

Confidentiality: Ensuring that only authorized individuals can access information.

Integrity: Maintaining information accuracy and reliability.

Availability: Ensuring data is accessible when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is confidentiality ensured?

A

Cryptography: Encrypts data to protect it.

Access Control: Ensures only authorized users access data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the key elements of access control?

A

Authentication: Verifying identity.

Authorization: Granting appropriate access.

Accounting: Keeping records of user activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the simplest method of authentication?

A

Passwords, but they become insecure when shared or easily guessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is multi-factor authentication?

A

A security system that requires multiple verification factors:

  • Something you know (password)
  • Something you have (phone, token)
  • Something you are (fingerprint, facial recognition)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are internal cybersecurity threats?

A

Intentional Malicious Behavior: Disgruntled employees leaking or modifying data.

Careless Behavior: Employees neglecting cybersecurity best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are external cybersecurity threats?

A
  1. Intrusions: Hackers gaining unauthorized access to systems.
  2. Social Engineering: Manipulating people into sharing sensitive data.
  3. Phishing: Fraudulent emails tricking users into giving personal information.
  4. Malware: Malicious software like viruses, worms, ransomware, and spyware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is social engineering?

A

A manipulation technique used to trick people into revealing confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is malware?

A

Malicious software designed to disrupt, damage, or steal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the different types of malware?

A

Virus: Attaches to files and spreads.

Worm: Spreads across networks without human intervention.

Trojan Horse: Disguises as legitimate software.

Ransomware: Locks files and demands payment.

Spyware: Secretly collects user information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is phishing?

A

A scam where attackers send deceptive emails or fake websites to steal user credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is spear-phishing?

A

A targeted phishing attack on a specific person or organization, often more sophisticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is online fake news?

A

The deliberate spread of false information to manipulate public opinion.

17
Q

Why are mobile and IoT devices vulnerable to cybersecurity threats?

A

They are full-fledged computers but often lack strong security measures.

18
Q

What is privacy in information security?

A

The right to control personal data and protect it from unauthorized access.

19
Q

What is a negative deliverable in cybersecurity?

A

Cybersecurity investments do not generate revenue but prevent potential losses.

20
Q

What are the three IT risk mitigation strategies?

A
  1. Risk Acceptance: Not investing in countermeasures, accepting potential failure costs.
  2. Risk Reduction: Investing in security measures to minimize threats.
  3. Risk Transference: Shifting risk to third parties (outsourcing, insurance).
21
Q

What are internal cybersecurity response strategies?

A

Security Policies: Guidelines to minimize risks.

Monitoring: Tracking and restricting risky activities.

Testing: Conducting security drills like fake phishing attacks.

22
Q

What are external cybersecurity response strategies?

A

Passwords: Balancing complexity and usability.

Firewalls: Filtering network traffic.

Encryption: Protecting data from unauthorized access.

Antivirus Software: Detecting and preventing malware attacks.