Chapter 17: Securing Information Systems Flashcards

1
Q

Security

A

Refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Controls

A

Specific method of ensuring security. Think of as gates in order to enter system. (passwords)

Methods, policies, and organizational procedures that ensure the safety of the organization’s assets; the accuracy and reliability of its records; and operational adherence to management standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worms

A

Independent computer programs that copy themselves from one computer to other computers over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan Horse

A

A software program that appears to be benign but then does something other than expected. The Trojan horse is not itself a virus because it does not replicate, but it is often away for viruses or other malicious code to be introduced into your computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SQL Injection Attacks

A

The largest malware threat. SQL injection attacks take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company’s systems and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spyware

A

These small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Keyloggers

A

Record every keystroke made on a computer to steal serial numbers for software, to launch Internet attacks, to gain access to email accounts, to obtain passwords to protected computer systems, or to pick up personal information such as credit cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hacker

A

A individual who intends to gain unauthorized access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cybervandalism

A

The intentional disruption, defacement, or even deactivation of a Web site or corporate information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spoofing

A

Involves redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sniffer

A

A type of eavesdropping program that monitors information traveling over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial-of-service (DoS) Attack

A

Hackers flood a network server or Web server with many thousands of false communications or requests for service to crash the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Distributed Denial-of-Service (DoSS)

A

Uses numerous computers to inundate an overwhelm the network from numerous launch points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Botnet

A

Perpetrators of DoS attacks often use thousands of “zombie” PCs infected with malicious software without their owner’s knowledge and organized into a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computer Crime

A

Any violation of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identity Theft

A

A crime in which an impostor obtains key pieces of personal information, such as social security identification numbers, driver’s license numbers, or credit card numbers, to impersonate someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Phishing

A

Involves setting up fake Web sites or sending emails or text messages that look like those of legitimate businesses to ask users for confidential personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Evil Twins

A

Wireless networks that pretend to offer trustworthy Wifi connections to the Internet, such as those in airier lounges, hotels, or coffee shops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Pharming

A

Redirects users to a bogus web page, even when the individual types the correct web page address into his or her browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Click Fraud

A

Occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Social Engineering

A

Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Bugs

A

Program code defects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Patches

A

Small pieces of software to repair the flaws without distributing the proper operation of the software

24
Q

HIPAA

A

Outlines the media security and privacy rules and procedures for simplifying the administration of health care providers, payers, and plans

25
Q

Gramm-Leach-Biley Act

A

Requires financial institutions to ensure the security and confidentiality of customer data

26
Q

Sarbanes-Oxley Act

A

Designed to protect investors after the financial scandals at Enron, WorldCom, and other public companies. Imposes responsibility to safeguard the accuracy and integrity of financial information that is used internally and released externally

27
Q

Computer Forensics

A

The scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved in computer storage media in such a way that the information can be used as evidence in a court of law

28
Q

General Control

A

Governs the design, security, and use of computer programs and the security of data files in general throughout the organization’s information technology infrastructure

29
Q

Application Controls

A

Specific controls unique to each computerized application, such as payroll or order processing

30
Q

Risk Assessment

A

Determines the level of risk to the firm if a specific activity or process is not properly controlled (like sensitivity analysis for
Security)

31
Q

Security Policy

A

Identify security risks, identify goals to mitigate risks, then figure out how to actually mitigate risks

Consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals

32
Q

Acceptable Use Policy (AUP)

A

Defines acceptable uses of the firm’s information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet

33
Q

Identity Management

A

Different ways to validate that that person is actually that person and control/grant them access to different levels of shit

Consists of business processes and software tools for identifying the valid users of a system and controlling their access to system resources

34
Q

Disaster Recovery Planning

A

Devises plans for the restoration of computing and communications services after the have been disrupted

35
Q

Business Continuity Planning

A

Focuses on how the company restore business operations after a disaster strikes

36
Q

MIS Audit

A

Examines the firm’s overall security environment as well as controls governing individual information systems

37
Q

Authentication

A

Refers to the ability to know that a person is who he or she claims to be

38
Q

Passwords

A

Known only to authorized users

39
Q

Token

A

A physical device, like a small keychain PIN generator, that is designed to prove the identity of a single user

40
Q

Smart Card

A

A device about the size of a credit card that contains a chip formatted with access permissions and other data

41
Q

Biometric Authentication

A

Uses systems that read and interpret individual human traits, such as finger prints, irises, and voices, in order to grant or deny access

42
Q

Firewalls

A

Prevent unauthorized users from accessing private networks

43
Q

Intrusion Detection Systems

A

Feature full-time monitoring tools placed at the most vulnerable points or “hot spots” of corporate networks to detect and deter intruders continually

44
Q

Antivirus Software

A

Designed to check computer systems and drives for the presence of computer viruses

45
Q

Unified threat Management

A

A single appliance with various security tools, including firewalls, virtual private networks, intrusion detection systems, and Web content filtering and antispam software

46
Q

Encryption

A

The process of transforming plain text or data into cipher text (coded text) that cannot be read by anyone other than the sender and the intended receiver

47
Q

Secure Sockets Layer (SSL)

A

** between two computers (ex. between retailers and consumer computers) ** Enable client and server computers to manage encryption and decryption activities as they communicate with each other during a secure Web session

48
Q

Secure Sockets Protocol (S-HTTP)

A

Another protocol used for encrypting data flowing over the Internet, but is limited to individual messages, whereas SSL and TLS are designed to establish a secure connection between two computers ** Further security for authentication. **

49
Q

Public Key Encryption

A

Uses two keys: one shared (or public) to send, and one totally private, to open and decrypt

50
Q

Digital Certificates

A

Data files used to establish the identity of users and electronic assets for protection of online transactions

51
Q

Online Transaction Processing

A

Transactions entered online are immediately processed by the computer. Multitudinous changes to the database, reporting, and requests for information occur each instance

52
Q

Fault-Tolerant Computer Systems

A

Contain redundant hardware, software, and power supply components that create an environment that provides continuos, uninterrupted service

53
Q

High-availability Computing

A

Helps firms recover quickly from a system crash, whereas fault tolerance promises continuous availability and the elimination of recovery time altogether

54
Q

Downtime

A

Refers to the period of time in which a system is not operational

55
Q

Recovery-oriented Computing

A

Researchers are exploring ways to make computing systems recover even more rapidly when mishaps occur

56
Q

Deep Packet Inspection (DPI)

A

DPI examines data files and sorts out low-priority online material while assigning higher priority to business-critical files

57
Q

Managed Security Service Providers (MSSPs)

A

Monitor network activity and perform vulnerability testing and intrusion detection (like home security network but for your company)