Chapter 8 Flashcards

1
Q

) attack uses numerous computers to inundate
and overwhelm the network from numerous launch points.

A

DDOS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

redirects users to a bogus Web page, even when the individual
types the correct Web page address into his or her browser.

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

uses systems that read and interpret individual
human traits, such as fingerprints, irises, and voices, in order to grant or deny
access.

A

Biometric Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the sender and
receiver establish a secure Internet session by creating a single encryption key
and sending it to the receiver so both the sender and receiver share the same
key

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a rogue software program that attaches itself to other software
programs or data files in order to be executed, usually without user knowledge
or permission

A

computer
virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

refers to the policies, procedure, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

focuses on how the company can restore business operations after a disaster strikes.

plan identifies
critical business processes and determines action plans for handling mission-critical functions if systems go down.

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

also may involve redirecting a Web link to an address different from the
intended one, with the site masquerading as the intended destinati

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

t determines the level of risk to the firm if a specific activity or process is not properly controlled. Not all risks can be anticipated and
measured, but most businesses will be able to acquire some understanding of
the risks they face.

A

Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a physical
device, similar to an identification card, that is designed to prove the identity
of a single user.

A

Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

are data files used to establish the identity of users and electronic assets for protection of online transactions

A

Digital Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

refers to the ability to know that a person is who he or she claims to be.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The initial security standard developed for Wi-Fi

A

Wired equivalent privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

check data for accuracy and completeness when they enter
the system. There are specific input controls for input authorization, data
conversion, data editing, and error handling

A

Input controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

contain redundant hardware, software,
and power supply components that create an environment that provides
continuous, uninterrupted service.

use special software routines or self-checking logic built into their circuitry to detect hardware
failures and automatically switch to a backup device.

A

Fault tolerant computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • are the largest malware threat
  • take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company’s systems
    and networks.
A

SQL Injection Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

enable client and server computers to manage encryption and decryption
activities as they communicate with each other during a secure Web session

A

Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

outlines medical security and privacy rules and procedures for
simplifying the administration of health care billing and automating the
transfer of health care data between health care providers, payers, and plans

A

Health Isurance portability and accountability act of 1996

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

examines the firm’s overall security
environment as well as controls governing individual information systems.

A

MIS Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

in which eavesdroppers drive by buildings or park outside and try to intercept
wireless network traffic.

A

War Driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

govern the
design, security, and use of computer programs and the security of data files in
general throughout the organization’s information technology infrastructure.

A

General Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

To correct software flaws once they are identified, the software vendor
creates small pieces of software

A

Patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

the intentional disruption, defacement, or even destruction of a Web site or
corporate information system

A

Cybervandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When errors are discovered, the source is found
and eliminated through a process

A

Debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Types of General control

A
  1. Hardware Control
  2. Software Control
  3. Computer operation Control
  4. Data security control
  5. Implementation control
  6. Administrative control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

helps firms recover quickly from a
system crash, whereas fault tolerance promises continuous availability and the
elimination of recovery time altogether.

A

High Availability computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

, hackers flood a network server or Web
server with many thousands of false communications or requests for services to
crash the network

A

DOS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

are methods, policies, and organizational
procedures that ensure the safety of the organization’s assets; the accuracy and
reliability of its records; and operational adherence to management standards.

A

Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

provides additional security by determining whether
packets are part of an ongoing dialogue between a sender and a receiver. It sets
up state tables to track information over multiple packets

A

Stateful Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

examines data files and sorts out low-priority online material
while assigning higher priority to business-critical files.

A

Deep packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

gain unauthorized access by finding weaknesses in the security protections employed by
Web sites and computer systems, often taking advantage of various features of
the Internet that make it an open system that is easy to use.

A

Hacker and cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

are wireless networks that pretend to offer trustworthy Wi-Fi
connections to the Internet, such as those in airport lounges, hotels, or coffee
shops.

A

Evil Twins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

is a crime in which an imposter
obtains key pieces of personal information, such as social security identification
numbers, driver’s license numbers, or credit card numbers, to impersonate
someone else

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

) can provide another layer of protection
when static packet filtering and stateful inspection are employed

A

Network Address Translation

35
Q

It imposes
responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and
released externally

y is fundamentally about ensuring that internal controls are in
place to govern the creation and documentation of information in financial statements

A

Sarbanes oxley act or Public company accounting reform and investor protection act of 2002

36
Q

examines the application content of packets.

A

Application proxy filtering

37
Q

feature
full-time monitoring tools placed at the most vulnerable points or “hot spots” of
corporate networks to detect and deter intruders continually

A

Intrusion detection Systems

38
Q

establish that
data are complete and accurate during updating.

A

Processing controls

39
Q

to make virus distribution and hacker attacks that disable Web sites federal crimes.

A

National information infrastructure protection act in 1996

40
Q

looks for patterns indicative of known methods of computer attacks, such as
bad passwords, checks to see if important files have been removed or modified,
and sends warnings of vandalism or system administration errors.

A

Scanning software`

41
Q

Types of Authentication Technology

A

Token, Smart Card, and Biometric Authentication

42
Q

A more secured form of encryption is called

A

Public key encryption

43
Q

consists of statements ranking information risks, identifying acceptable
security goals, and identifying the mechanisms for achieving these goals.

A

Security Policy

44
Q

ensure that the results of computer processing are accurate, complete, and properly
distributed.

A

Output Controls

45
Q

is a software program that appears to be benign but then
does something other than expected

A

Trojan Horse

46
Q

is an individual who intends to gain unauthorized access to a computer system.

A

Hacker

47
Q

consists of business processes and software tools for identifying
the valid users of a system and controlling their access to system resources

A

Identity Management

48
Q

is a type of eavesdropping program that monitors information
traveling over a network.

A

Sniffer

49
Q

is designed to
check computer systems and drives for the presence of computer viruses.

A

Antivirus software

50
Q

These small programs
install themselves surreptitiously on computers to monitor user Web surfing
activity and serve up advertising.

A

Spyware

51
Q

is another protocol used for
encrypting data flowing over the Internet, but it is limited to individual
messages

A

Secure Hypertext transfer Protocol

52
Q

Are referred to as malware and include variety of threats, such as computer viruses, worms, and trojan hoarses

A

malicious software

53
Q

which are independent
computer programs that copy themselves from one computer to other computers over a network.

A

Worms

54
Q

It is up to users of the
software to track these vulnerabilities, test, and apply all patches

A

Patch Management

55
Q

is typically used
to denote a hacker with criminal intent, although in the public press, the terms
hacker and cracker are used interchangeably

A

Cracker

56
Q

infecting other people’s computers
with bot malware that opens a back door through which an attacker can give
instructions.

A

Botnet

57
Q

examines events as they are happening to discover security attacks in
progress.

A

Monitoring software

58
Q

are often spread over the Internet from files of downloaded software, from files attached to e-mail transmissions, or from
compromised e-mail messages or instant messaging

A

Worms and Viruses

59
Q

This act
requires financial institutions to ensure the security and confidentiality of
customer data. Data must be stored on a secure medium, and special security
measures must be enforced to protect such data on storage media and during
transmittal.

A

Financial service modernization act of 1999 or Gramm-Leach-blibey act

60
Q

any violations of criminal law
that involve a knowledge of computer technology for their perpetration, investigation, or prosecution.”

A

Computer Crime

61
Q

n is the process of
transforming plain text or data into cipher text that cannot be read by anyone
other than the sender and the intended receiver.

A

Encryption

62
Q

record every keystroke made on a computer to steal serial numbers for software, to launch Internet attacks, to gain access to
e-mail accounts, to obtain passwords to protected computer systems, or to pick
up personal information such as credit card numbers

A

keyloggers

63
Q

devises plans for the restoration of computing and communications services after they
have been disrupted.

focus primarily on the technical
issues involved in keeping systems up and running, such as which files to back
up and the maintenance of backup computer systems

A

Disaster recovery planning

64
Q

are specific controls unique to each computerized
application, such as payroll or order processing. They include both automated
and manual procedures that ensure that only authorized data are completely
and accurately processed by that application.

A

Application Control

65
Q

Researchers are exploring ways to make computing systems recover even
more rapidly when mishaps occur, an approach called

A

Recovery oriented computing

66
Q

examines selected fields in the headers of data packets flowing
back and forth between the trusted network and the Internet, examining individual packets in isolation. T

A

Packet Filtering

67
Q

—a review of a specification or design document by a small group
of people carefully selected based on the skills needed for the particular objectives being tested

A

Walkthrough

68
Q

is a device about the
size of a credit card that contains a chip formatted with access permission and
other data

A

Smart Card

69
Q

Program code defect

A

bugs

70
Q

The largest botnet attack in 2010 which started in Spain and spread across the world.

A

mariposa botnet

71
Q

is the
scientific collection, examination, authentication, preservation, and analysis of
data held on or retrieved from computer storage media in such a way that the
information can be used as evidence in a court of law. It deals with the following
problems:
* Recovering data from computers while preserving evidential integrity
* Securely storing and handling recovered electronic data
* Finding significant information in a large volume of electronic data
* Presenting the information to a court of law

A

Computer Forensic

72
Q

occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the
advertiser or making a purchase.

A

Click Fraud

73
Q

Malicious intruders seeking system access sometimes trick employees
into revealing their passwords by pretending to be legitimate members of the
company in need of information

A

Social Engineering

74
Q

the use of public key cryptography working with a CA, is now widely used in e-commerce

A

Public key Infrastructure

75
Q

transactions entered online are immediately processed by the computer

A

Online transaction processing

76
Q

defines acceptable uses of
the firm’s information resources and computing equipment, including desktop
and laptop computers, wireless devices, telephones, and the Internet

A

Acceptable Use Policy

77
Q

monitor network activity and perform vulnerability
testing and intrusion detection.

A

Managed Security service provider

78
Q

Identifying the access points in a WiFi network are broadcast multiple times and can be picked up fairly easily by intruders’ sniffer program.

A

Service Set Indentifier

79
Q

comprehensive security management
products To help businesses reduce costs and improve manageability, security vendors
have combined into a single appliance various security tools

A

Unified threat management

80
Q

The U.S. Congress addressed the threat of computer crime in 1986 with the

A

Computer fraud and abuse act of 1986

81
Q

prevent unauthorized users from accessing private networks.

is a combination of hardware and software that controls the flow of
incoming and outgoing network traffic.

A

Firewall

82
Q

The ______________ may be
relatively benign, such as the instructions to display a message or image, or it
may be highly destructive—destroying programs or data, clogging computer
memory, reformatting a computer’s hard drive, or causing programs to run
improperly

A

Payload

83
Q

involves setting up fake Web sites or sending e-mail or text messages that look
like those of legitimate businesses to ask users for confidential personal data.

A

Phishing