Chapter 8: Securing Information Systems Flashcards

1
Q

Digital data is vulnerable to

A

destruction, misuse, error, fraud, and hardware of software failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spoofing

A

Tricking or deceiving computer systems by hiding or faking one’s identity (fake e-mail addresses or masquerading as someone else)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sniffing

A

type of eavesdropping program that monitors information traveling over network (f.e. enables hackers to steal information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Denial-of-Service attacks (DoS) & Distributed DOS (DDoS)

A

DoS: flooding server with thousands of false requests to crash the network
DDoS: use of numerous computers to launch a DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnets

A

networks of “zombie” PC’s infiltrated by bot malware, can perform spam attacks , DoS, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identity Theft

A

Theft of personal information (social security ID, driver’s license, or credit card numbers) to impersonate someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing

A

setting up fake websites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evil twins

A

wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A

redirects users to a bogus web page, even when individual types correct Web page address into their browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Click Fraud

A

occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase - imitate users clicking on your system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internal threats: Employees

A
  • sloppy security procedures
  • both end users and IS specialists are sources of risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Software presents problems because

A
  • software bugs may be impossible to eliminate
  • software vulnerabilities can be exploited by hackers and malicious software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware

A

can disable systems and websites, with special focus on mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firms relying on computer systems for their core business functions are at risk of

A
  • losing sales and productivity due to lack of security and control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

various information assets such as business plans lose value if

A

they are released to outsiders or of they expose the firm to legal liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

electronic evidence (probative digital material) and computer forensics also require firms to

A

pay more attention to security and electronic records management

17
Q

General Controls (for IS)

A
  • overall control environment governing the design, security, and use of computer programs and the security of data files in general throughout organisation’s information technology infrastructure
  • types of general controls: software controls, hardware controls, computer operations controls, data security controls, system development controls, administrative controls
18
Q

Application Controls (for IS)

A
  • specific controls unique to each computerised application that ensure that only authorised data are completely and accurately processed by that application
  • include: input controls, processing controls, output controls
19
Q

Risk assessment

A
  • evaluate information assets
  • identify control points and control weaknesses
  • determine the most cost-effective set of controls
20
Q

Security policy

A
  • includes policies for acceptable use and identity management
  • ranks information risks
  • identifies security goals
  • mechanisms for achieving these goals
  • having coherent and tailored corporate security policies and plans for continuing business operations in case of disruption is imperative
  • AUP (acceptable use policy) defines acceptable uses of firm’s information resources & computing
21
Q

Identity management software

A
  • automates keeping track of all users and privileges
  • authenticates users, protecting identities, controlling access
22
Q

Authentication

A

password systems, tokens, smart cards, etc.

23
Q

Firewall

A

combination of hardware and software that prevents unauthorised users from accessing private networks

24
Q

Intrusion detection systems

A
  • monitor networks to detect and deter intruders
  • examines events as they are happening to discover attacks in progress
25
Q

Viruses

A

rogue software program that attaches itself to other software programs or data files in order to be executed

26
Q

Worms

A

independent programs that copy themselves from one computer to other over a network

27
Q

Trojan horses

A

Software that appears benign but does something other than expected

28
Q

SQL injection hacks

A

hackers submit data to web forms that exploits site’s unprotected software and sends rogue SQL query to database

29
Q

ransomware

A

encrypt files on a device, rendering an files and the system that rely on them unusable and demanding ransom for decryption

30
Q

Spyware

A

gathering information about a person or organization without their knowledge though technology

31
Q

Encryption

A
  • transforming text or data into cipher text that cannot be read by unintended recipients
  • two methods: SSL (secure socket layer)/ TLS (transport security layer) and S-HTTP (Secure hypertext transfer protocol)
32
Q

Standard used today for encryption

A

AES (advanced encryption standard)

33
Q

Blockchain technology

A

enables companies to create and verify tamperproof transactions on a network without a central authority

34
Q

Digital certificates combined with public key encryption

A

provide further protection of electronic transactions by authenticating a users identity

35
Q

PKI (public key infrastructure)

A

available for anyone to use. data encrypted with the public key can only be decrypted with the private key

36
Q

Fault-tolerant computer systems

A

systems can operate even when one or more parts of them fail

37
Q

using software metrics and rigorous software testing help improve

A

software quality and reliability