Ch 8 Text Flashcards

1
Q

What is identity theft?

A

A crime in which an imposter obtains key pieces of personal information, such as social security numbers, driver’s license numbers, or credit card numbers, to impersonate someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is phishing?

A

Involves setting up fake websites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data

The e-mail instructs recipients to update or confirm records by providing social security, bank and credit card information, and other confidential data either by responding to the e-mail, by entering the information at a bogus website, or calling a telephone number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an evil twins attack?

A

Wireless networks that pretend to offer trustworthy Wi-fi connections to the Internet, such as those in airport lounges, hotels, or coffee shops

Looks identical to the public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is pharming?

A

Redirects users to a bogus web page, even when the individual types the correct web page address in their browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is click fraud?

A

Occurs when an individual or computer program fraudulently clicks an online ad without any intention of learning more about the advertiser or making a purchase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is cyberwarfare?

A

A state-sponsored activity designed to cripple and defeat another state or nation by penetrating its computers or networks to cause damage and disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some mitigating controls?

A

Authentication
Passwords
Token
Biometric Authentication
Two-Factor Authentication
Firewalls
Intrusion Detection System
Antivirus Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is authentication?

A

Refers to the ability to know that a person is who he or she claims to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are passwords?

A

Known only to authorized users, used to log on to a computer and system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a token?

A

A physical device, similar to an identification card, that is designed to prove the identity of a single user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is biometric authentication?

A

Uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices to grant or deny access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is two-factor authentication?

A

Increases security by validating users through a multi-step process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a firewall?

A

Prevent unauthorized users from accessing private networks; a combination of hardware and software that controls the flow of incoming and outgoing network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an intrusion detection system?

A

Full-time monitoring tools placed at the most vulnerable points or hotspots of corporate networks to detect and deter intruders continually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is antivirus software?

A

Prevents, detects, and removes malware, including computer viruses, computer worms, Trojan horses, spyware, and adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are policies, procedures, and standards that can be put in place?

A

General Controls
Application Controls
Security Policy
Acceptable User Policy
Identity Management
Disaster Recovery Planning
Information Systems Audit

17
Q

What are general controls?

A

Govern the design, security, and use of computer programs and the security of data files in general throughout the organization’s information technology infrastructure

Ex. Software controls, hardware controls, computer operations control, data security controls, implementation controls, and administrative controls

18
Q

What are application controls?

A

Specific controls unique to each computerized application

19
Q

What is security policy?

A

Consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals

20
Q

What is acceptable user policy?

A

Defines acceptable use of the firm’s information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet

21
Q

What is identity management?

A

Business processes and software tools for identifying the valid users of a system and controlling their access to system resources

22
Q

What is disaster recovery planning?

A

Devises plan for the restoration of disrupted computing and communications services

23
Q

What is an information systems audit?

A

Examines the firm’s overall security environment as well as controls governing individual information systems

24
Q

What is the risk assessment process?

A

Determines the level of risk to the firm is a specific activity or process is not properly controlled

25
Q

What are the characteristics of a secure company?

A