IT Security and Controls Flashcards
1
Q
Risks with Business Information Systems
A
system availability volatile transaction trails decreased human involvement uniform processing of transactions unauthorized access data vulnerability reduced segregation of duties reduced individual authorization of transactions malicious software (malware)
2
Q
Trojan Horse
A
an apparently innocent program that includes a hidden function that may do damage when activated
3
Q
Virus
A
program that copies itself from file to file
4
Q
Logic Bomb
A
type of virus triggered by a predetermined event
5
Q
Worm
A
copies itself from computer to computer
6
Q
Denial of Service Attack
A
an attempt to overload a system with messages so that it cannot function
7
Q
Phishing
A
method of electronically obtaining confidential information through deceit
8
Q
Spoofing
A
redirection to the perpetrator’s website
9
Q
Back Door
A
program that allows unauthorized access to a system and bypasses the normal login procedures