Info Systems Quiz 2 Flashcards
Security
degree of protection against criminal activity, danger, damage, or loss
Information Security
all of the processes and policies designed to protect an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
Threat
any danger to which a system may be exposed
Exposure
harm, loss, or damage that can result if a threat compromises that resource
Vulnerability
possibility that a threat will harm that resource
Five key factors contributing to increasing vulnerability of organizational information resources
- today’s interconnected, interdependent, wirelessly networked business environment
- smaller, faster, cheaper computers and storage devices
- decreasing skills necessary to be a computer hacker
- International organized crime taking over cybercrime
- lack of management support
trusted vs untrusted network
trusted: any network within your organization
untrusted: any network external to your organization
Cybercrime
illegal activites conducted over computer networks, particularly the internet
Two categories of threats to information systems
unintentional threats and deliberate threats
Unintentional threats
acts performed without malicious intent that nevertheless represent a serious threat to information security
Human error
unintentional threat, higher level of employee=greater threat to security since more access to data
ex. carelessness with computing devices, opening questionable emails, careless internet surfing, poor passwords
Social engineering
Attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information, such as passwords
Social engineering techniques
tailgating: designed to allow the perpetrator to enter restricted areas that are controlled with locks or card entry
shoulder surfing: perpetrator watches an employee’s computer screen over the employee’s shoulder
Deliberate threats to Information systems (ten)
- espionage or trespass
- information extortion
- sabotage or vandalism
- theft of equipment or information
- identity theft
- compromises to intellectual property
- software attacks
- alien software
- supervisory control and data acquisition (SCADA) attacks
- cyberterrorism and cyber warfare
Espionage or trespass
unauthorized individual attempts to gain illegal access to organizational information
Information extortion
occurs when an attacker wither threatens to steal or actually steals information from a company
Sabotage or vandalism
deliberate acts that involve defacing an organization’s website, potentially damaging the organization’s image and causing its customer to lose faith
Threat of equipment or information
computing devices and storage devices are becoming smaller yet more powerful with vastly increased storage
Dumpster diving
involves rummaging through commercial or residential trash to find discarded information
Identity theft
deliberate assumption of another person’s identity, usually to gain access to his or her financial information or to frame him or her for a crime
techniques: stealing mail or dumpster diving, stealing personal information from computer databases
Intellectual property
property created by individuals or corporations that is protected under trade secret, patent, and copyright laws
Trade work
intellectual work, such as a business plan, that is a company secret and is not based on public information
patent
official document that grants the holder exclusive rights on an invention or a process for a specific period of time
Copyright
statutory grant that provides the creators or owners of intellectual property
Piracy
copying a software program without making payment to the owner-including giving a disc to a friend to install on his or her computer
Malware
when attackers used malicious software, to infect as many computers worldwide as possible, to the profit-driven web-based attacks of today
Three types of software attacks
remote attacks requiring user action, remote attacks requiring no user action, and software attacks initiated by programmers during the development of a system
Ransomware
digital extortion, blocks access to a computer system or encrypts an organization’s data until the organization pays a sum of money
Spear phishing
employees receive hundreds of emails everyday many of their roles require them to download and open attachments
Alien software
Clandestine software that is installed on your computer through duplicitous methods
Adware
software that causes pop-up advertisements to appear on your screen
Spyware
software that collects personal information about users without their consent; keystroke loggers and screen scrapers
Spamware
pestware that uses your computer as a launch pad for spammers
Spam
unsolicited e-mail, usually advertising for products and services