MIS Chapter 4 Flashcards

1
Q

Acceptable Use Policy (AUP)

A

Requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet.

  • Not using the service as part of violating any law
  • Not attempting to break the security of any computer network or user
  • Not Posting commercial messages to groups without prior permission
  • Not performing any nonrepudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adware

A

Is software tha, while purporting to serve some useful functions and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advanced Encryption Standard (AES)

A

Designed by the National Institute of Standards to keep government information secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anti-Spam Policy

A

Simply states that email users will not send unsolicited emails (or spam).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anitvirus Software

A

Scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A

Is a method for confirming users’ indentities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorization

A

Is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Biometrics

A

Is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Black-hat Hackers

A

Break into other people’s computer systems and may just look around or may steal and destroy information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Certificate Authority

A

Is a trusted third party, such as VeriSign, that validates user identities by means of digital certification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Child Online Protection Act (COPA)

A

Was passed to protect minors from accessing inappropriate material on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Click-Fraud

A

Is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Competitive Click-Fraud

A

Is a computer crime where a competitor or disgruntled employee increases a company’s search advertising costs by repeatedly clicking on the advertiser’s link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Confidentiality

A

Is the assurance that messages and information remain available only to those authorized to view them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Content Filtering

A

Occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Copyright

A

Is the legal protection afforded an expression of an idea, such as a song, book, or video game.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Counterfeit Software

A

Is software that is manufactured to look like the real thing and sold as such.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cracker

A

Have criminal intent when hacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cryptography

A

Is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cyberbullying

A

Includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cybervandalism

A

Is the electronic defacing of an existing website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cyberterrorism

A

Is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious or ideological goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cyberwar

A

Is an organized attempt by a country’s military to disrupt or destroy information and communication systems for another country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Decrypt

A

To decode information that has been encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Destructive Agents

A

Are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Digital Certificate

A

Is a data file that identifies individuals or organizations online and is comparable to a digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Digital Rights Management

A

Is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Downtime

A

Refers to a period of time when a system is unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Drive-By Hacking

A

Is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or send attack instruction without entering the office or organization that owns the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Dumpster Diving

A

Looking through people’s trash to obtain information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Ediscovery (or Electronic Discovery)

A

Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Email Privacy Policy

A

Details the extent to which email messages may be read by others.

  • Defines legitimate email users and explains what happens to accounts after a person leaves the organization
  • Explains backup procedure so users will know that at some point, even if a message is deleted from their computer, it is still stored by the company
  • Describes the legitimate grounds for reading email and the process required before such action is performed
  • Discourages sending junk email or spam to anyone who does not want to receive it
  • Prohibits attempting to mail bomb a site
  • Informs users that the organization has no control over email once it has been transmitted outside the organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Employee Monitoring Policy

A

States explicitly how, when, and where the company monitors its employees.

  • Be as specific as possible stating when and what (email, IM, Internet, network activity, ext.) will be monitored
  • Expressly communicate that the company reserves the right to monitor all employees
  • State the consequences of violating the policy
  • Always enforce the policy the same for everyone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Encryption

A

Scrambles information into an alternative form that requires a key or password to decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Epolicies

A

Are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

  1. Ethical Computer Use Policy
  2. Information Privacy Policy
  3. Acceptable Use Policy
  4. Email Privacy Policy
  5. Social Media Policy
  6. Workplace Monitoring Policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Ethical Computer Use Policy

A

Contains general principles to guide computer user behavior.

37
Q

Ethics

A

The principles and standards that guide our behavior.

38
Q

Firewall

A

Is hardware and/or software that guards a private network by analyzing incoming and outgoing information for the correct markings.

39
Q

Hackers

A

Are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

40
Q

Hactivists

A

Have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

41
Q

Identity Theft

A

Is the forging of someone’s identity for the purpose of fraud.

42
Q

Information Compliance

A

Is the act of conforming, acquiescing, or yielding information.

43
Q

Information Ethics

A

Governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies).

44
Q

Information Governance

A

Is a method or system of government for information management or control.

45
Q

Information Management

A

Examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

46
Q

Information Property

A

Is an ethical issue that focusses on who owns information about individuals and how information can be sold and exchanged.

47
Q

Information Secrecy

A

Is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

48
Q

Information Privacy Policy

A

Contains general principles regarding information privacy.

49
Q

Information Security

A

Is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

  1. People
    - Authentication and Authorization
  2. Data
    - Prevention and Resistance
  3. Attacks
    - Detection and Response
50
Q

Information Security Plan

A

Details how an organization will implement the information security policies.

  • Applications allowed to be placed on the corporate network
  • Corporate computer equipment used for personal reason or personal networks
  • Password creation and maintenance including minimum password length, characters to be included while choosing passwords, and frequency for password changes
  • Personal computer equipment allowed to connect to the corporate network
51
Q

Information Security Policies

A

Identify the rules required to maintain information security,, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days.

52
Q

Insiders

A

re legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.

53
Q

Intellectual Property

A

Is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

54
Q

Internet Censorship

A

Is government’s attempt to control Internet traffic, thus preventing some material from being viewed by a country’s citizens.

55
Q

Internet Use Policy

A

Contains general principles to guide the proper use of the Internet.

  • Describes the Internet services available to users
  • Defines the organization’s position on the purpose of Internet access and what restrictions, if any, are placed on that access
  • Describes user responsibility for citing sources, properly handling offensive material, and protecting the organization’s good name
  • States the ramifications if the policy is violated
56
Q

Intrusion Detection Software (IDS)

A

Features full-time monitoring tools that search for patterns in network traffic to identify intruders.

57
Q

Mail Bomb

A

Sends a massive amount of email to a specific person or system that can cause that user’s server to stop functioning.

58
Q

Nonrepudiation

A

Is a contractual stipulation to ensure that ebusiness participants do not deny (Repudiate) their online actions.

59
Q

Opt Out

A

When a user voluntarily chooses to deny permission to incoming emails.

60
Q

Patent

A

Is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

61
Q

Pharming

A

Reroutes requests for legitimate websites to false websites.

62
Q

Phishing

A

Is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.

63
Q

Phishing Expedition

A

Is a masquerading attack that combines spam with spoofing.

64
Q

Physical Security

A

Is tangible protection such as alarms, guards, fireproof doors, fences, and vaults.

65
Q

Pirated Software

A

Is the unauthorized use, duplication, distribution, or sale of copyrighted software.

66
Q

Privacy

A

Is the right to be left alone when you want to be, to have control over your personal possessions, and not be observed without your consent.

67
Q

Public Key Encryption (PKE)

A

Uses two keys: a public key that everyone can have and private key for only the recipient.

68
Q

Script Kiddies or Script Bunnies

A

Find hacking codes on the Internet and click-and-point their way into systems to cause damage or spread viruses.

69
Q

Smart Card

A

Is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.

70
Q

Spear Phishing

A

Is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

71
Q

Social Engineering

A

When hackers use their social skills to trick people into revealing access credentials or other valuable information.

72
Q

Social Media Policy

A

Outlines the corporate guidelines or principles governing employee online communications.

  • Employee online communication policy detailing brand communication
  • Employee blog and personal blog policies
  • Employee social network and personal social network policies
  • Employee Twitter, corporate Twitter, and personal Twitter policies
  • Employee LinkedIn policy
  • Employee Facebook usage and brand policy
  • Corporate YouTube policy
73
Q

Spam

A

Unsolicited email.

74
Q

Spyware

A

Is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

75
Q

Teergrubing

A

Is an anti spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

76
Q

Threat

A

Is an act or object that poses a danger to assets.

77
Q

Time Bomb

A

Are computer viruses that wait for a specific date before executing their instructions.

78
Q

Tokens

A

Are small electronic devices that change user passwords automatically.

79
Q

Typosquatting

A

Is a problem that occurs when someone registers purposely misspelled variation of well-know domain names.

80
Q

Virus

A

Is software written with malicious intent to cause annoyance or damage.

  • Backdoor programs
  • Denial-of-Service Attack (DoS)
  • Distributed Denial-of-Service Attack (DDoS)
  • Polymorphic Viruses and Worms
  • Trojan-Horse Virus
  • Worm
  • Elevation of Privilege
  • Hoaxes
  • Malicious Code
  • Packet Tampering
  • Sniffer
  • Spoofing
  • Splogs (Spam Blogs)
  • Spyware
81
Q

Vishing (Voice Phishing)

A

Is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to “confirm” their account information.

82
Q

Website Name Stealing

A

Is the theft of a webs it’s name that occurs when someone, posing as a site’s administrator, changes the ownership of the domain name assigned to the website to another website owner.

83
Q

White-Hat Hackers

A

Work at the request of the system owners to find system vulnerabilities and plug the holes.

84
Q

Workplace MIS Monitoring

A

Tracks people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed.

85
Q

Zombie

A

Is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

86
Q

Zombie Farm

A

Is a group of computers on which a hacker has planted zombie programs.

87
Q

Legal/Illegal vs. Ethical/Unethical

A
  1. Legal and Ethical
  2. Illegal but Ethical
  3. Legal but Unethical
  4. Illegal and Unethical
88
Q

Downtime Costs

A
  1. Financial Performance
    - Revenue Recognition
    - Cash Flow
    - Payment Guarantees
    - Credit Rating
    - Stock Price
  2. Revenue
    - Direct Loss
    - Compensatory Payments
    - Lost Future Revenue
    - Investment Losses
    - Lost Productivity
  3. Damaged Reputation
    - Customers
    - Suppliers
    - Financial Market
    - Banks
    - Business Partners
  4. Other Expenses
    - Temporary Employees
    - Equipment Rentals
    - Overtime costs
    - Extra Shipping Charges
    - Travel Expenses
    - Legal Obligations