IT: Chapter 7: Securing Information Systems Flashcards

1
Q

Security

A

refers to the policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Controls

A

methods, policies, and organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its records, and operational adherences to management standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SSIDs (Service set identifiers)

A

identify the access points in a Wi-Fi network are broadcast multiple times and can be picked up fairly easily by intruders’ sniffer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

War Driving

A

eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rogue Access points

A

To force a user’s radio network interface controller to associate with the rogue access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

malicious software programs include a variety of threats, such as viruses, works, and Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A

rogue software program that attaches itself to other software programs or data files in order to be executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worms

A

independent computer programs that copy themselves from one computer to other computers over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojan Horses

A

software program that appears to be benign but then does something other than expected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SQL injection attacks

A

take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company’s systems and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

small programs install themselves surreptitiously on computers to monitor user Web surfing activity and server up advertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key loggers

A

record every keystroke on computer to steal serial numbers, passwords, launch internet attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hacker

A

an individual who intends to gain unauthorized access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cracker

A

typically used to denote a hacker with criminal intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cybervandalism

A

the intentional disruption, defacement, or even destruction of a Web site or corporate information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spoofing

A

misrepresenting oneself by using fake e-mail addresses or masquerading as someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Sniffer

A

eavesdropping program that monitors information traveling over network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Denial-of-service attacks (DoS)

A

flooding server with thousands of false requests to crash the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Distributed Denial-of-service attacks ((DDoS)

A

uses numerous computers to inundate and overwhelm the network from numerous launch points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Botnets

A

networks of “zombies” PCs infiltrated by bot malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Computer Crime

A

any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identity theft

A

an imposter obtains key pieces of personal information (social security ID, driver’s license, or credit card numbers) to impersonate someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Phishing

A

setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Evil Twins

A

wireless networks that pretend to offer trustworthy Wi-Fi connections to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Pharming

A

redirects users to a bogus Web page even when individual types correct Web page address to his or her browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Click fraud

A

an individual or a computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cyberware

A

state-sponsored activity designed to cripple and defeat another state or nation by penetrating its computers or networks for the purposes of causing damage and disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Social engineering

A

tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

hidden bugs

A

program code defects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

patches

A

small pieces of software to repair flaws released by vendors

31
Q

HIPPA (Health Insurance Portability and Accountability Act)

A

outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data between health care providers, payers, and plans

32
Q

Gramm-Leach-Biley Act

A

requires financial institutions to ensure the security and confidentiality of customer data

33
Q

Sarbanes-Oxley Act

A

imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally

34
Q

Computer forensics

A

scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in court of law

35
Q

General Control

A

govern the design, security, and use of computer programs and the security of data files in general throughout the organization’s information technology infrastructure.

36
Q

Application control

A

specific controls unique to each computerized application, such as payroll or order processing

37
Q

Input Controls

A

check data for accuracy and completely when they enter the system

38
Q

Processing Controls

A

establish that data are complete and accurate during updating

39
Q

Output Controls

A

ensure that the results of computer processing are accurate, complete, and properly distributed

40
Q

Risk Assessment

A

determines level of risk to firm if specific activity or process is not properly controlled

41
Q

Security Policy

A

consists of statements ranking information risk, identifying acceptable security goals, and identifying the mechanisms for achieving goals

42
Q

Acceptable Use Police (AUP)

A

defines acceptable uses of the firm’s information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet

43
Q

Identity management

A

consists of business processes and software tools for identifying the valid users of a system and controlling their access to system resources

44
Q

Disaster recovery planning

A

devises plans for the restoration of computing and communications services after they have been disrupted

45
Q

Business continuity planning

A

focuses on how the company can restore business operations after a disaster strikes

46
Q

MIS Audit

A

examines the firm’s overall security environment as well as controls governing individual information systems

47
Q

Authentication

A

refer to the ability to know that a person is who he or she claims to be

48
Q

Tokens

A

physical device, similar to an identification card that is designed to prove the identity of a single user

49
Q

Smart Cards

A

a device about the size of a credit card that contains a chip formatted with access permission and other data

50
Q

Biometric authentication

A

uses systems that read and interpret individual human traits such as fingerprints, irises, and voices ,in order to grant or deny access

51
Q

Firewall

A

combination of hardware and software that controls the flow of incoming and outgoing network traffic

52
Q

Packet filtering

A

examines selected fields in the headers of data packets flowing back and forth between the trusted network and the internet

53
Q

Stateful inspection

A

provides additional security by determining whether packets are part of an ongoing dialogue between a sender and a receiver

54
Q

Network Address Translation (NAT)

A

conceals the IP addresses of the organizations internal host computers to prevent sniffer programs outside the firewall from ascertaining them and using that information to penetrate internal systems

55
Q

Application proxy filtering

A

examines the application content of packets.

56
Q

Intrusion detection Systems

A

feature full-time monitoring tools placed at the most vulnerable points or “hot spots” of corporate networks to deter intruders

57
Q

Antivirus software

A

prevents, detects, and removes malware, and can often eliminate it as well

58
Q

Unified Threat Management Systems (UTM)

A

security vendors combined into a single appliance various security tools, including firewalls, virtual private networks intrusion detection systems, and Web content filtering and antispam software to help businesses reduce costs and improve manageability

59
Q

Encryption

A

the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver

60
Q

Secure Sockets Layer (SSL) and successor Transport Layer Security (TLS)

A

enable client and server computers to manage encryption and decryption activities as they communicate with each other during a secure Web session.

61
Q

Secure Hypertext Transfer Protocol (S-HTT)

A

used for encrypting data flowing over the Internet, but it is limited to individual messages

62
Q

Symmetric Key Encryption

A

sender and receiver use single, shared key

63
Q

Public key encryption

A

uses two mathematically related keys: public key or private key

64
Q

Digital Certificate

A

data file used to establish the identity of users and electronic assets for protection of online transactions

65
Q

Public Key infrastructure

A

use of public key cryptography working with certificate authority

66
Q

Fault-tolerate Computer Systems

A

contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service

67
Q

High-availability computing

A

helps recover quickly from crash, minimizes, does not eliminate, down time

68
Q

Recovery-oriented computing

A

designing systems that recover quickly with capabilities to help operators pinpoint and correct faults in multicomponent systems

69
Q

Deep packet inspected (DPI)

A

examines data files and sorts out low-priority online material while assigning higher priority to business-critical files

70
Q

Managed security service provider (MSSPs)

A

monitor network activity and perform vulnerability testing and intrusion detection

71
Q

Software Metrics

A

objective assessments of system in form of quantified measurements

72
Q

Walkthrough

A

review of specification or design document by small group of qualified people

73
Q

Debugging

A

process by which errors are eliminated