Info Systems Quiz 2 Flashcards

1
Q

Security

A

degree of protection against criminal activity, danger, damage, or loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Security

A

all of the processes and policies designed to protect an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat

A

any danger to which a system may be exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exposure

A

harm, loss, or damage that can result if a threat compromises that resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability

A

possibility that a threat will harm that resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Five key factors contributing to increasing vulnerability of organizational information resources

A
  1. today’s interconnected, interdependent, wirelessly networked business environment
  2. smaller, faster, cheaper computers and storage devices
  3. decreasing skills necessary to be a computer hacker
  4. International organized crime taking over cybercrime
  5. lack of management support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

trusted vs untrusted network

A

trusted: any network within your organization
untrusted: any network external to your organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cybercrime

A

illegal activites conducted over computer networks, particularly the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two categories of threats to information systems

A

unintentional threats and deliberate threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unintentional threats

A

acts performed without malicious intent that nevertheless represent a serious threat to information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Human error

A

unintentional threat, higher level of employee=greater threat to security since more access to data
ex. carelessness with computing devices, opening questionable emails, careless internet surfing, poor passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social engineering

A

Attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information, such as passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social engineering techniques

A

tailgating: designed to allow the perpetrator to enter restricted areas that are controlled with locks or card entry
shoulder surfing: perpetrator watches an employee’s computer screen over the employee’s shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Deliberate threats to Information systems (ten)

A
  1. espionage or trespass
  2. information extortion
  3. sabotage or vandalism
  4. theft of equipment or information
  5. identity theft
  6. compromises to intellectual property
  7. software attacks
  8. alien software
  9. supervisory control and data acquisition (SCADA) attacks
  10. cyberterrorism and cyber warfare
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Espionage or trespass

A

unauthorized individual attempts to gain illegal access to organizational information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information extortion

A

occurs when an attacker wither threatens to steal or actually steals information from a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Sabotage or vandalism

A

deliberate acts that involve defacing an organization’s website, potentially damaging the organization’s image and causing its customer to lose faith

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Threat of equipment or information

A

computing devices and storage devices are becoming smaller yet more powerful with vastly increased storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dumpster diving

A

involves rummaging through commercial or residential trash to find discarded information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Identity theft

A

deliberate assumption of another person’s identity, usually to gain access to his or her financial information or to frame him or her for a crime
techniques: stealing mail or dumpster diving, stealing personal information from computer databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Intellectual property

A

property created by individuals or corporations that is protected under trade secret, patent, and copyright laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Trade work

A

intellectual work, such as a business plan, that is a company secret and is not based on public information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

patent

A

official document that grants the holder exclusive rights on an invention or a process for a specific period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Copyright

A

statutory grant that provides the creators or owners of intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Piracy

A

copying a software program without making payment to the owner-including giving a disc to a friend to install on his or her computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Malware

A

when attackers used malicious software, to infect as many computers worldwide as possible, to the profit-driven web-based attacks of today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Three types of software attacks

A

remote attacks requiring user action, remote attacks requiring no user action, and software attacks initiated by programmers during the development of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Ransomware

A

digital extortion, blocks access to a computer system or encrypts an organization’s data until the organization pays a sum of money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Spear phishing

A

employees receive hundreds of emails everyday many of their roles require them to download and open attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Alien software

A

Clandestine software that is installed on your computer through duplicitous methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Adware

A

software that causes pop-up advertisements to appear on your screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Spyware

A

software that collects personal information about users without their consent; keystroke loggers and screen scrapers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Spamware

A

pestware that uses your computer as a launch pad for spammers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Spam

A

unsolicited e-mail, usually advertising for products and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Cookies

A

small amounts of information that websites store on your computer, temporarily or more or less permanently

36
Q

SCADA

A

Supervisory control and data acquisition; large-scale distributed measurement and control system

37
Q

Cyberterrorism and cyber warfare

A

refer to malicious acts in which attackers use a target’s computer systems, particularly through the internet, to cause physical, real-world harm or severe disruption, often to carry out a political agenda

38
Q

Controls

A

defense mechanisms designed to protect all of the components of an information system, including data, software, hardware, and networks

39
Q

Three major information security controls

A

physical controls, access controls, and communications controls

40
Q

Physical controls

A

prevent unauthorized individuals from gaining access to a company’s facilities ex. walls, doors, fencing, gates, locks

41
Q

access controls

A

restrict unauthorized individuals from information resources

42
Q

two functions of access controls

A

authentication: confirms the identity of the person requiring access
authorization: determines which actions, rights, or has, based on his or her verified identity

43
Q

Biometrics

A

an authentication method that examines a person’s innate physical characteristics

44
Q

Active and passive biometric authentication

A

active: require the user to physically participate in the verification process by taking an action like speaking, placing a finger or eye in proximity
passive: capable of identifying a person without their active participation ex. voice recognition and behavioral identification

45
Q

Communication controls

A

secure movement of data across networks

46
Q

firewall

A

system that prevents a specific type of information from moving between untrusted networks, such as the internet, and the private networks, such as your company’s network, demilitarized zone: two firewalls

47
Q

Anti-malware systems

A

antivirus are software packages that attempt to identify and eliminate viruses and worms and other malicious software

48
Q

Whitelisting

A

process in which a company identifies the software that it will allow to run on its computers

49
Q

blacklisting

A

allows everything to run unless it is on the blacklist, includes certain types of software that are not allowed to run in the company environment

50
Q

Virtual private network

A

private network that uses a public network to connect users
tunneling: encrypts each data packet to be sent and places each encrypted packet inside another packet

51
Q

Transport layer security

A

encryption standard used for secure transactions such as credit card purchases and online banking

52
Q

Public-key encryption

A

public key: publicly available in a directory that all parties can access
private key: kept secret, never shared with anyone, and never sent across the internet

53
Q

Certificate authority

A

acts as a trusted intermediary between the companies

54
Q

Digital certificate

A

electronic document attached to a file that certifies that the file is from the organization it claims to be from and has not been modified from its original format

55
Q

Virtual private network (VPN)

A

private network that uses a public network to connect users

56
Q

Tunneling

A

encrypts each data packet to be sent and places each encrypted packet inside another packet

57
Q

Transport layer security

A

aka secure socket layer ; encryption standard used for secure transactions such was credit card purchases and online banking

58
Q

Employee monitoring system

A

scrutinize their employees’ computers, email activities, and internet surfing activities

59
Q

Business continuity

A

chain of events linking planning protection and to recovery

60
Q

Bandwidth

A

transmission capacity of a network, stated in bits per second

61
Q

Computer network

A

system that connects computers and other services through communications media so that data and information can be transmitted among them

62
Q

Broadband

A

transmission capacity of communications medium faster than 25 megabits per second for download

63
Q

Local area network

A

connects two or more devices in a limited geographical region, usually within the dame building, so that every device on the network can communicate with every other device

64
Q

file/network server

A

contains various software and data for the network

65
Q

Wide area network

A

WAN, network that covers a large geographical area ex. at and t

66
Q

Routers

A

communications processor that routes messages from a LAN to the internet

67
Q

Enterprise network

A

displays a model of enterprise computing

68
Q

Backbone networks

A

high-speed central networks to which multiple smaller networks connect

69
Q

Communication channel

A

consists of two types of media: cable and broadcast

70
Q

wireline media

A

uses physical wires or cables to transmit data and information the alternative is broadcast media

71
Q

Twisted pair wire

A

used for almost all business telephone wiring, relatively inexpensive, slow for transmitting data, can be easily tapped

72
Q

Coaxial Cable

A

consist of insulated copper wire, less susceptible to electrical interference and carries more data, more expensive and harder to work with

73
Q

Fiber-optic cable

A

consists of thousands of very thin filaments of glass fibers that transmit information through pulses of light generated by lasers, can transmit far more data,

74
Q

Protocol

A

enable computing devices to communicate with one another

75
Q

ethernet

A

network provides data transmission speeds of 100 gigabits

76
Q

Transmission Control Protocol/internet protocol

A

IP, protocol of the internet, responsible for disassembling, delivering, and reassembling the data during transmission

77
Q

Hypertext transfer protocol

A

defines how message are formulated and how they are interpreted by their receivers

78
Q

Distributed processing

A

divides processing work among two or more computers, enables computers in different locations to communicate with one another through telecommunications links

79
Q

Client/server computing

A

links two or more computers in an arrangement in some machines, called servers, provide computing services for user pc’s

80
Q

Intranet

A

network that uses internet protocols so that users can take advantage of familiar applications and work habits

81
Q

Extranet

A

connects parts of the intranets of different organizations, enables business partners to communicate securely over the internet using VPNs

82
Q

IP address

A

distinguishes computer from all other ones, consists of sets of numbers, in four parts, separated by dots

83
Q

World Wide Web

A

system of universally accepted standards for storing, retrieving, formatting, and displaying information through a client/server architecture

84
Q

Seven domains

A

user domain -> workstation domain -> LAN domain-> LAN-to-WAN domain-> WAN domain-> system/application domain-> remote access domain

85
Q

Packet switching

A

emails, never get sent in one “package”, easier to transmit data in parts rather than one place

86
Q

Internet connection methods

A

Dial-up: still used in US where broadband is not available
DSL: broadband access through telephone companies
Cable modern: access over your cable TV coaxial cable. can have degraded performance if many of your neighbors are accessing the internet at once
Satellite: access where cable and DSL are not available
Wireless: very convenient, and WiMAX will increase the use of broadband wireless
Fiber-to-the-home (FTTH): expensive and usually placed only in new housing developments