CHAPTER 8 SECURING INFORMATION SYSTEMS Flashcards

1
Q

Protocol used for encrypting data flowing over the internet; limited to individual messages

A

S-HTTP (Secure Hypertext Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enables client and server computers to manage encryption and decryption activities as they communicate with each other during a web session

A

SSL (Secure Sockets Layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data file used to establish the identity of users and electronic assets for protection of online transactions. Uses certification authority (CA) to validate a user’s identity. CA verifies user’s identity, stores information in CA server, which generates encrypted digital certificate containing owner ID information and copy of owner’s public key

A

Digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Uses two, mathematically related keys: public key and private key
  • Sender encrypts message with recipient’s public key
  • Recipient decrypts with private key
A

Public key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Use of public key cryptography working with certificate authority. Widely used in e-commerce

A

Public key infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sender and receiver use single, shared key

A

Symmetric key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two methods of encryptions are:

A
  • Symmetric key encryption
  • Public key encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transforming text or data into cipher text that cannot be read by unintended recipients

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Are products that include multiple security features integrated into one box

A

Unified Threat Management (UTM) systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Check computers for presence of malware and can often eliminate it as well. Require continual updating.

A

Antivirus and antispyware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Monitor hot spots on corporate networks to detect and deter intruders. Examine events as they are happening to discover attacks in progress.

A

Intrusion detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Combination of hardware and software that prevents unauthorized access to network

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access

A

Biometric authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A device about the size of a credit card that contains a chip formatted with access permission and other data

A

Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A physical device, similar to an identification card, that is designed to prove the identity of a single user

A

Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication is often established by using passwords known only to authorized users

A

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refers to the ability to know that a person is who he or she claims to be

A

Authentication

13
Q

Business process and technologies for identifying valid users of system. Creates different levels or roles of system user and access. Allows each user access only to those portions of system under that user role

A

Identity management

14
Q

A policy that a user must agree to follow in order to be provided access to a network or to the internet

A

Acceptable use policy (AUP)

15
Q

Ranks information risks, Identifies acceptable security goals, Identifies mechanisms for achieving these goals, Drives other policies

A

Security policy

16
Q

Determines level of risk to firm if specific activity or process is not properly controlled

A

Risk management

17
Q

Application controls

A

Specific controls unique to each computerized application, such as payroll or order processing.
* Includes both automated and manual procedures.
* Ensure that only authorized data are completely and accurately processed by that application.
- Includes: Input controls, processing controls, Output controls

18
Q

Tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information

A

Social engineering

19
Q

What is click fraud?

A

Fraudulent clicks on online ads

20
Q

What is cyberwarfare?

A

Actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption

21
Q

Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser

A

Pharming

22
Q

Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

A

Evil twins

23
Q

Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

A

Phishing

24
Q

Networks of “zombie” PCs infiltrated by bot malware

A

Botnets

25
Q

Use of numerous computers to launch a DoS

A

Denial-of-service attacks (DoS)

26
Q

Eavesdropping program that monitors information traveling over network; Enables hackers to steal proprietary information such as e-mail, company files, and so on

A

Sniffer

27
Q

Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else; Redirecting Web link to address different from intended one, with site masquerading as intended destination

A

Spoofing

28
Q

Intentional disruption, defacement, destruction of Web site or corporate information system

A

Cybervandalism

29
Q

Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks

A

Keyloggers

30
Q

Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

A

Spyware

31
Q

Software program that appears to be benign but then does something other than expected

A

Trojan horses

32
Q

Independent computer programs that copy themselves from one computer to other computers over a network

A

Worms

33
Q

Rogue software program that attaches itself to other software programs or data files in order to be executed

A

Viruses

34
Q

What is war driving?

A

Eavesdroppers drive by buildings and try to intercept network traffic; With access to SSID, has access to network’s resources

35
Q

Power failures, flood, fires, and so on

A

Disasters

36
Q

Breakdowns, configuration errors, damage from improper use or crime

A

Hardware problems

37
Q

Programming errors, installation errors, unauthorized changes

A

Software problems