Chapter 8 Flashcards
) attack uses numerous computers to inundate
and overwhelm the network from numerous launch points.
DDOS attack
redirects users to a bogus Web page, even when the individual
types the correct Web page address into his or her browser.
Pharming
uses systems that read and interpret individual
human traits, such as fingerprints, irises, and voices, in order to grant or deny
access.
Biometric Authentication
the sender and
receiver establish a secure Internet session by creating a single encryption key
and sending it to the receiver so both the sender and receiver share the same
key
Symmetric Encryption
is a rogue software program that attaches itself to other software
programs or data files in order to be executed, usually without user knowledge
or permission
computer
virus
refers to the policies, procedure, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
Security
focuses on how the company can restore business operations after a disaster strikes.
plan identifies
critical business processes and determines action plans for handling mission-critical functions if systems go down.
Business Continuity Planning
also may involve redirecting a Web link to an address different from the
intended one, with the site masquerading as the intended destinati
Spoofing
t determines the level of risk to the firm if a specific activity or process is not properly controlled. Not all risks can be anticipated and
measured, but most businesses will be able to acquire some understanding of
the risks they face.
Risk Assessment
is a physical
device, similar to an identification card, that is designed to prove the identity
of a single user.
Token
are data files used to establish the identity of users and electronic assets for protection of online transactions
Digital Certificate
refers to the ability to know that a person is who he or she claims to be.
Authentication
The initial security standard developed for Wi-Fi
Wired equivalent privacy
check data for accuracy and completeness when they enter
the system. There are specific input controls for input authorization, data
conversion, data editing, and error handling
Input controls
contain redundant hardware, software,
and power supply components that create an environment that provides
continuous, uninterrupted service.
use special software routines or self-checking logic built into their circuitry to detect hardware
failures and automatically switch to a backup device.
Fault tolerant computer system
- are the largest malware threat
- take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company’s systems
and networks.
SQL Injection Attack
enable client and server computers to manage encryption and decryption
activities as they communicate with each other during a secure Web session
Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS)
outlines medical security and privacy rules and procedures for
simplifying the administration of health care billing and automating the
transfer of health care data between health care providers, payers, and plans
Health Isurance portability and accountability act of 1996
examines the firm’s overall security
environment as well as controls governing individual information systems.
MIS Audit
in which eavesdroppers drive by buildings or park outside and try to intercept
wireless network traffic.
War Driving
govern the
design, security, and use of computer programs and the security of data files in
general throughout the organization’s information technology infrastructure.
General Control
To correct software flaws once they are identified, the software vendor
creates small pieces of software
Patch
the intentional disruption, defacement, or even destruction of a Web site or
corporate information system
Cybervandalism
When errors are discovered, the source is found
and eliminated through a process
Debugging
Types of General control
- Hardware Control
- Software Control
- Computer operation Control
- Data security control
- Implementation control
- Administrative control
helps firms recover quickly from a
system crash, whereas fault tolerance promises continuous availability and the
elimination of recovery time altogether.
High Availability computing
, hackers flood a network server or Web
server with many thousands of false communications or requests for services to
crash the network
DOS attack
are methods, policies, and organizational
procedures that ensure the safety of the organization’s assets; the accuracy and
reliability of its records; and operational adherence to management standards.
Controls
provides additional security by determining whether
packets are part of an ongoing dialogue between a sender and a receiver. It sets
up state tables to track information over multiple packets
Stateful Inspection
examines data files and sorts out low-priority online material
while assigning higher priority to business-critical files.
Deep packet inspection
gain unauthorized access by finding weaknesses in the security protections employed by
Web sites and computer systems, often taking advantage of various features of
the Internet that make it an open system that is easy to use.
Hacker and cracker
are wireless networks that pretend to offer trustworthy Wi-Fi
connections to the Internet, such as those in airport lounges, hotels, or coffee
shops.
Evil Twins
is a crime in which an imposter
obtains key pieces of personal information, such as social security identification
numbers, driver’s license numbers, or credit card numbers, to impersonate
someone else
Identity Theft