Information Systems Security & Dark Side of IT and Digital Wellness Flashcards

1
Q

Black hat hackers

A

use their hacking skills to gain unauthorized access to computer systems or networks for malicious purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Botnets

A

network of computers that are infected with malware and controlled by a single entity to carry out various activities such as stealing personal information, spamming, or launching DDoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Distributed denial of service (DDoS) attack

A

Multiple compromised systems are used to flood a targeted website or server with traffic, making it inaccessible to legitimate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption

A

scrambling/encoding data or messages in such a way that only authorized parties can read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewalls

A

software or hardware-based network security system that monitors and controls incoming and outgoing network traffic based on predefined security rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

type of software designed to harm or exploit computer systems -> viruses, worms, Trojans, and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing

A

attempt to deceive individuals into providing personal or sensitive information by posing as a trustworthy entity via email, text message, or other forms of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social engineering

A

art of manipulating people into revealing sensitive information or performing actions that are not in their best interest, often through deception or coercion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spyware

A

type of malware that secretly gathers personal information from a computer system without the user’s knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

White hat hackers

A

use their hacking skills for ethical purposes (hacktivist)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can an employee or a vendor be the biggest threat to information security?

A

o Insiders can do greater harm
- Easier access
- Greater window of opportunity
- Through legitimate access -> go undetected by Perimeter-based security solutions
- detecting inside attacks -> harder and becoming more frequent
o Dramatic increase in the size and complexity of IT
- Cloud-based services (providers/servers)
- outsourced activity
- dark websites/cybercrime as a service
- employees using personal devices for work (BYOD)
- Millions of malware infected devices
o Explosion of social media
- Allows for leaks
- opportunities to recruit insiders (phishing/social engineering)
- external attacks may involve insiders (un)knowingly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the main motivations behind the inside cyber threat?

A

o Financial gain
o revenge
o desire for recognition and power
o response to blackmail loyalty to others
o political believes
o collaboration with organised crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the key steps to safeguard the inside cyber attack?

A

Adopt a robust insider policy
Raise awareness
Look out for threats when hiring
Employ rigorous subcontracting processes
Monitor
(See Word Sheet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is technostress? What are its main effects?

A

o IT induced stress
- feel forced to rapidly multitask because info streams come in real time
- Remote work/flextime
- Short tech cycles -> constantly changing systems
- nearly 3/3 of employees worry that refraining from constant connectivity puts them at a disadvantage
- complex user interface that does not naturally fit with task workflows
- more stress when organisations embrace IT relentlessly & enthusiastically
- addiction to technology -> restriction hard with BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is misuse of IT?

A

o Inside attacks of authorised users -> malicious user behaviour
o unsanctioned behaviour (shadow IT/accessing unauthorised areas)
o naïve user interactions -> opening unknown email attachment
-> motivation to become more effective/to help others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why should senior leaders care about misuse of IT?

A
  • threat to productivity and innovation
  • Excessive IT-use can harm employee well-being
  • monetary and reputational risk -> litigation
  • technical integrity and operational viability -> misuse can lead to data breaches and system downtime -> IP theft
  • legal risks -> sue for addiction/harassment/etc.
17
Q

What is digital detoxing? Does it really work?

A

o Digital detox – digital abstinence
o doesn’t work because
- rarely coupled with cognitive restructuring/reflection
- leads to binge/overindulgence afterwards
- doesn’t create a long lasting change
-> we need to reclaim sustainable and healthy relationship with technology

18
Q

How can leaders tackle the dark side of IT?

A
  • Senior leadership should make mindful use of IT an organizational priority
  • IT leaders should build and maintain vigilance against IT’s dark side
  • HR leaders should monitor and enhance employees’ well-being
    (See Word Sheet)