Lesson 5 Flashcards

1
Q

What is scareware?

A

Exploits fear to trick users into paying for unnecessary software or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Trojans?

A

Disguise themselves as legitimate files or applications to trick users into executing them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are botnets?

A

Networks of compromised devices that can be used to launch attacks or spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is phishing?

A

Involves collecting sensitive user information, usually passwords and credit card numbers.

Typically carried out through e-mails or messages disguised as genuine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are SQL injections?

A

Attack data-based applications by breaching security measures and using malicious code.

Can collect, alter, or delete classified data and interrupt certain website transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is rogue security software?

A

Deceives users by claiming their systems are infected with a virus or have outdated security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Man-in-the-Middle attack?

A

Allows a hacker to intercept and listen to conversations between two entities.

The hacker can appear as one of the entities while obtaining private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is pharming?

A

A more complex version of phishing that misuses the domain name system (DNS).

Pharmers create web pages that mimic those of reliable businesses, such as online banking login pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data governance?

A

The basic level that implements Information Governance (IG).

Involves processes and controls to ensure unique, accurate, and reliable data that meet business standards and rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Information Technology Governance (IT Governance)?

A

Aims to improve business organizations’ IT performance.

Ensures delivery of optimal business value and compliance with rules and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the elements of data governance?

A
  1. People - Responsible for managing data assets and supporting business activities and initiatives.
  2. Process - Includes how data is stored, modified, accessed, moved, and secured.
  3. Technology - Supports the implementation and maintenance of Data Governance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Information Technology Infrastructure Library (ITIL)?

A

A set of best process-oriented practices identified to regulate the delivery of IT services management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is CobiT?

A

Can be applied to three basic organizational levels:

  1. Top Management
  2. IT Management and Business Management
  3. Security Level of Governance, Control, and Worker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a legacy system?

A

Uses old versions of technology that business organizations may consider as investments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a manual system?

A

Uses source documents and paper-based ledgers and journals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a modern and integrated IT system?

A

Modern and user-friendly.

Utilizes the latest powerful technologies, offers high data storage, and can be accessed through different platforms.

17
Q

What are business processes?

A

Refers to the sequence of performed tasks that produce a desired output for a business organization.

It is a process that has a beginning and an end.

18
Q

What is information generation?

A

A process where relevant information is compiled, arranged, formatted, and presented to users.

The information should be summarized, accurate, relevant, complete, and related to the transactions done in the AIS.

19
Q

What is storage in an AIS?

A

Allows users to add new records in an AIS and store them in a certain place in a database.

20
Q

What is retrieval in an AIS?

A

Allows users to locate and extract existing records from a database and process them accordingly.

Once the process is complete, users can store the records in a specific place in a database.

21
Q

What are data sources in an AIS?

A

AISs allow data to enter the system through data sources such as financial transactions.

These data, coming from financial transactions, could either be from internal or external sources.

22
Q

Who are external users in an AIS?

A

Those who are not part of a business organization but play a significant role in an AIS.

They include stockholders, suppliers, customers, investors, and others.

23
Q

What is data management?

A

The database is the main repository of any IS of a business organization.

The AIS database should perform the three essential tasks of storage, retrieval, and completion.