IT Security and Controls Flashcards

1
Q

Risks with Business Information Systems

A
system availability
volatile transaction trails
decreased human involvement
uniform processing of transactions
unauthorized access
data vulnerability
reduced segregation of duties
reduced individual authorization of transactions
malicious software (malware)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trojan Horse

A

an apparently innocent program that includes a hidden function that may do damage when activated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virus

A

program that copies itself from file to file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Logic Bomb

A

type of virus triggered by a predetermined event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worm

A

copies itself from computer to computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial of Service Attack

A

an attempt to overload a system with messages so that it cannot function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing

A

method of electronically obtaining confidential information through deceit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spoofing

A

redirection to the perpetrator’s website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Back Door

A

program that allows unauthorized access to a system and bypasses the normal login procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly