Info Systems Exam 2 Flashcards

1
Q

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

A

Cyber Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bad things happen online

A

Spyware SPAM Vishing
Adware Phishing Smishing
Malware Pharming Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hackers are not all the same

A

Script Kiddies
Sophisticated Networks
White Hats
Criminal Organizations
Black Hats
Government Sponsored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Happens to Everyone

A

The question is not “Have we been hacked”
The right question is “To what extent have we been hacked, and how vulnerable are we going forward.”
How do we respond / position ourselves. PR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You can not protect against all attacks…
You should still protect yourself from attacks.

Make sure you are a difficult target.

A

Target hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ways to Cause Issues - warez

A

Sniffing AirSnort

Spoofing Altering Packet Headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attacks - Offense

A

DoS
DDoS
Cain and Abel (Man in the middle)
Commonly associated with hotels
Brute Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attacks - Offense 2

A

Viruses Blended
Worms Logic Bombs
Trojan Horses Ransomware
Social Engineering Backdoors
SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Segments - where

A

network
drive
app or OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Segments - How

A

social engineering
technology- 0s and 1s
Policies- Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Segments - What happens

A

reveal secrets
Change data
Prevent Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Some Things To Do - Defense

A

Biometrics - fingerprints / eye scans / gait / size
Mantraps - think airlock - 2 doors, 1 at a time
Firewalls - so many meanings
Intrusion Detection Systems - IDS
“Air Gap” - talk about stuxnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Defense

A

Policies and Procedures
Audit and test

User Training
Recurring and everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot - Defense

A

A honeypot is setup to detect, and then mitigate attacks.
Think of fake email accounts used on common sites to see if they start to receive attacks after visiting a potentially dangerous site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password Policies

A

Complexity / Length / Strength
Frequency of change
Proper care for Passwords - KeePass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

you are who you claim to be

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

you have access some things

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

e-Commerce Three step process:

A

Authentication - validates identity
Confirmation - sender gets a receipt
Non Repudiation - no backing out of the deal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Return to previous state

A

Disaster Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Keep going forward

A

Business Continuity
Backups Cold Swap
Hot Swap SneakerNet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is a set of one or more fields/columns that can identify a record uniquely in a table. There can be multiple ___ Keys in one table. Each ____ Key could work as the Primary Key.

A

Candidate Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

s a set of one or more fields/columns of a table that uniquely identify a record in database table. It can not accept null as a value. No duplicate values.

A

Primary Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is a key that can be work as a primary key. Basically it is a candidate key that currently is not defined as the primary key.

A

Alternate / Alternative Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is a combination of more than one fields/columns of a table. Any of the other keys can be a ____ key simply by including multiple fields.

A

Composite / Compound Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

is a set of one or more fields/columns of a table that uniquely identify a record in database table. It is like Primary key but it can accept only one null value and it can not have duplicate values.

A

Unique Key

26
Q

is a field (or set of fields) in a database table that is the primary key in another table. It can accept multiple null, duplicate values.

A

Foreign Key

27
Q

Any key that is comprised of data that exists in the real world - not system generated.

A

Natural Key

28
Q

A system generated key. Typically incremented integers…. 1 2 3 4

A

Surrogate or Artificial Key

29
Q

UUID and GUID

A

Universal Unique Identifier
Globally Unique Identifier - MS’s UUID

30
Q

Issues around data

A

Legal What the government cares about
Professional Organizations and compliance
Ethical Balancing costs and benefits
Standards Many different levels
Personal What do you care about?
Guidance Pythonic, for example

31
Q

All kinds of language

A

EULA
Acceptable Usage Policies
Good Actor Policies
Policies and Procedures - operations - NOCs
Non Repudiation - No opting out

32
Q

Compliance / Standards

A

PCI - PCI DSS: Payment Card Information
Data Security Standard

SAS 70 → SSAE 16: Auditing and reporting standards for service organizations

33
Q

NDA

A

Non Disclosure Agreements

34
Q

Non Competes -

A

Limited Time
Limited Market - Geography
Limited Market - Business Segment

35
Q

SLA

A

Service Level Agreement
We will try very hard to meet an agreed to standard

36
Q

SLO

A

Service Level Objective
We will deliver on the standard or we will pay a penalty

37
Q

SLI

A

Service Level Indicator
We will measure ____ to see if we are in compliance

38
Q

IP - Not just an address

A

Intellectual Property - who owns the code and what can they do with it?

What can you patent?

39
Q

Globalization - The World Is Flat

A

Friedman defines 10 “Flatteners”:
Outsourcing Informing Supply Chaining
Offshoring Nearshoring Workflow
Insourcing Uploading Netscape

40
Q

The Dangers of Consulting

A

Partnering and clear divisions of responsibility can be very useful - they can also lead to something called “The clay layer”, as demonstrated in the video below.

41
Q

Sharing browsing history / viewing data among many major sites provides for analytics and tailored advertisements.
You can see this: Browse “porter cable air compressors” on Amazon and see how long it takes to show up on other sites you visit.

A

Tracking

42
Q

A simple idea that snowballs into massive data capture and marketing.
Small amount of data stored locally on the client browser between sessions. Browsers can remember things - so nice.

A

Cookies

43
Q

A way to understand a sequence of website requests as a single context.

Connecting data across multiple requests, so they can provide a unified experience for the end user.

A

Session

44
Q

A record of each request made to a server.
It ends up looking just like a database table

A

Log Files

45
Q

Moving data from one location to another

A

Data Communication

46
Q

Bandwidth

A

Broadband - multiple signals at once, reassembled at the other end

Narrowband - ordered, much smaller capacity

47
Q

As the communication travels further, it loses signal strength

A

Attenuation:

48
Q

Used to connect to the network - mostly built into routers.

A

Modem:

49
Q

very simple devices - not sophisticated

A

Hubs

50
Q

smarter than hubs, same thing

A

Switches

51
Q

Knows about other networks

A

Routers -

52
Q

Manages connection to your ISP (most corporate routers do this)

A

Modems

53
Q

Types of connection

A

From a Book -
Conducted - physical connections
STP / UTP / Coaxial / Fiber (Fiber Optic)
Radiated - wireless
Frequency ranges / Microwave / Satellite

54
Q

how will the “handshake” be defined? What are you expecting the messages to look like?

What is the agreed upon sequence of things?

A

Protocols

55
Q

Running Out of Addresses

A

NIC - Network Interface Card
IP Addresses vs MAC addresses
IPv4 - IPv6
LAN / MAN / WAN

56
Q

The dominant model is called 3-Tier or N-Tier
N-Tier means there can be many, many layers

A

Client Server

57
Q

Wiring & Convergence

A

RJ-11 - 4 wires - voice
RJ-45 - 8 wires - data - A quick walkthrough
Cat5 / Cat5e / Cat6
different kinds of network cables LINK
Convergence - single cable, all the data!

58
Q

Where it started

A

1969 - ARPNET - US Defense Department
1980’s - The Internet
1989 - The World Wide Web
1992 - First visual web browser

59
Q

The Basic Building Blocks:
Internet vs The Web

A

Internet = Connected computers
The Web = Connected documents

60
Q

The Basic Building Blocks

A

The Backbone - Core connections
HTML - a standard format / language
Search - A way to find “things”

61
Q

.com / .org / .net / .mil / .edu
Now it is the wild west - so many TLD

A

TLD - Top Level Domains