Lesson 5 Flashcards
What is scareware?
Exploits fear to trick users into paying for unnecessary software or services.
What are Trojans?
Disguise themselves as legitimate files or applications to trick users into executing them.
What are botnets?
Networks of compromised devices that can be used to launch attacks or spam.
What is phishing?
Involves collecting sensitive user information, usually passwords and credit card numbers.
Typically carried out through e-mails or messages disguised as genuine.
What are SQL injections?
Attack data-based applications by breaching security measures and using malicious code.
Can collect, alter, or delete classified data and interrupt certain website transactions.
What is rogue security software?
Deceives users by claiming their systems are infected with a virus or have outdated security measures.
What is a Man-in-the-Middle attack?
Allows a hacker to intercept and listen to conversations between two entities.
The hacker can appear as one of the entities while obtaining private keys.
What is pharming?
A more complex version of phishing that misuses the domain name system (DNS).
Pharmers create web pages that mimic those of reliable businesses, such as online banking login pages.
What is data governance?
The basic level that implements Information Governance (IG).
Involves processes and controls to ensure unique, accurate, and reliable data that meet business standards and rules.
What is Information Technology Governance (IT Governance)?
Aims to improve business organizations’ IT performance.
Ensures delivery of optimal business value and compliance with rules and regulations.
What are the elements of data governance?
- People - Responsible for managing data assets and supporting business activities and initiatives.
- Process - Includes how data is stored, modified, accessed, moved, and secured.
- Technology - Supports the implementation and maintenance of Data Governance.
What is the Information Technology Infrastructure Library (ITIL)?
A set of best process-oriented practices identified to regulate the delivery of IT services management.
What is CobiT?
Can be applied to three basic organizational levels:
- Top Management
- IT Management and Business Management
- Security Level of Governance, Control, and Worker
What is a legacy system?
Uses old versions of technology that business organizations may consider as investments.
What is a manual system?
Uses source documents and paper-based ledgers and journals.