Info & Comm: Types of Info Systems and technology Flashcards
Risk Event Identification
Risk types
A) Strategic Risk-risk of choosing inappr. technology
B) Operating Risk-risk of doing the right things the wrong way
C) Financial Risk- financial resources lost wanted or stolen
D) Informational Risk - data integrity, incomplete transactions, or hackers
Virus
piece of computer program that inserts itself into some other program
Worm
Runs independently and normally propogates itself over a network, it cannot attach itself to other programs
Trojan Horse
program that appears to have a useful function but contains a hidden and unintended function that presents a security risk
Denial of Service Attack
one computer or group of computers bombards another computer with a flood of network traffic
Phishing
sending of phony emails to try to lure people to phony websites
Risk Assessment and Control Activities
1) Risk
2) Threat
3) Vulnerability
4) Safeguards & Controls
Access Controls
Physical Access-Keyacrd etc
Electronic Access -Built into hardware who can get in and who can’t.
User ID’s and Passwords
Firewall
Hardware or software of user identification and authentication that prevents unauthorized users from gaining access to network. Acts as a gatekeeper
Application Firewall
designed to protect specific application services from attack