Domain II – Information Security - Section B: Emerging Technologies and Cybersecurity Flashcards
Bring Your Own Device (BYOD)
is an alternative strategy allowing employees and
other users to utilize a personally selected and purchased client device to execute enterprise applications and access data. Typically, it spans smartphones and tablets, but the strategy may also be used for PCs.
The Internet of Things (IoT)
refers to the scenario in which physical and virtual objects are provided with unique IP addresses for internet connectivity without requiring human interaction.
=> Security systems, sensors, thermostats, vehicles, home appliances, alarms, vending machines
and other everyday objects can be connected to the internet to communicate andinteract with the external environment and to provide for remotely monitoring and
controlling.
Cloud Computing
is a style of computing in which IT‐enabled capabilities are delivered as a service using internet technologies.
Cybersecurity
refers to the technologies, processes, and practices designed to protect an organization’s information assets from unauthorized access.
Hacking
A security hacker is a skilled computer expert who attempts to breach defenses and exploit weaknesses in an information system.
Piracy
is the unauthorized use or reproduction of another’s work.
Tampering
is the deliberate altering or modifying of information, a product, a package, or system through unauthorized channels.
Ransomware Attacks
is a type of malware that blocks access to victim’s data or threatens to publish it unless a ransom is paid.
Phishing Attacks
is a type of electronic mail attack that attempts to convince a user that the originator is genuine, but with the intention of obtaining information for use in social engineering or other unauthorized purposes.
Cybersecurity Governance
The internal audit activity should understand the organization’s cybersecurity governance. Governance may include clarifying roles and responsibilities, establishing accountability, adopting a multiyear strategy, and prioritizing action plans to include strategic collaboration with multiple stakeholders.