MIS: Exam 4 - Ch 8 Flashcards

1
Q

Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Methods, policies and organizational procedures that ensure safety of organizations assets, accuracy/reliability of records, and operating standards.

A

Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information security expert who attacks a system on behalf of it’s owners/developers in an effort to identify vulnerabilities that a malicious hacker could exploit.

A

Ethical Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A non-technical method of intrusion that relies heavily on human interactions and deception in order to gain access to protected systems and/or information.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provides some security by assigning unique name to network’s SSID (service set identifiers) and not broadcasting SSID. Using it with VPN technology

A

WEP (Wired Equivalent Privacy) Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uses continually changing keys and encrypted authentication system with central server. Replaced WEP with stronger standards. Wi-Fi Alliance finalized it.

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rogue software program that attaches itself to other software programs or data files in order to be executed

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Independent computer programs that copy themselves from one computer to other computers over a network.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software program that appears to be benign but then does something other than expected.

A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hackers submit data to Web forms that exploits site’s unprotected software and sends rogue SQL query to database

A

SQL Injection Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks

A

Key Loggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Hackers and Crackers have in common?

A

Both gain access by finding and exploiting security weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Used to denote a Hacker with criminal intent

A

Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution.

A

Computer Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In computer crime, the computer may be the _______ of crime OR the _______ of crime

A

Computer may be target of crime OR instrument of crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Computer/Cyber crime activities include:

A

system intrusion, system damage, Hacktivism, Cybervandalism

19
Q

Intentional disruption, defacement, destruction of Web site or corporate information system

A

Cybervandalism

20
Q

Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else OR Redirecting Web link to address different from intended one, with site masquerading as intended destination

A

Spoofing

21
Q

Eavesdropping program that monitors information traveling over network. Enables hackers to steal proprietary information such as e-mail, company files, etc.

A

Sniffer

22
Q

Flooding server with thousands of false requests to crash the system/network.

A

DOS - Denial of Service Attacks

23
Q

Use of numerous computers to launch a DoS

A

DDos - Distributed Denial-of-service attacks

24
Q

Networks of “zombie” PCs infiltrated by malware. Worldwide, 6 - 24 million computers serve as zombie PCs in thousands of ______s

A

Botnets

25
Q

Medical security and privacy rules and procedures

A

HIPAA

26
Q

Requires financial institutions to ensure the security and confidentiality of customer data

A

Gramm-Leach-Bliley Act

27
Q

Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally

A

Sarbanes-Oxley Act

28
Q

Example of authentication method, Something you know:

A

Password

29
Q

Example of authentication method, Something you have:

A

Smart Card / Token

30
Q

Example of authentication method, Something you are:

A

Biometric Authentication - Finger prints, iris, voice recognition

31
Q

Combination of hardware and software that prevents unauthorized users from accessing private networks. Scans and identifies network traffic

A

Firewall

32
Q

Place between the Corporate Network and the WWW where certain info can be accessed from outside the company while the rest of the corporate network is guarded by 2 firewalls.

A

Demilitarized Zone

33
Q

Monitor hot spots on corporate networks to detect and deter intruders. Examines events as they are happening to discover attacks in progress

A

Intrusion Detection System

34
Q

Checks computers for presence of malware and can often eliminate it as well. Requires continual updating

A

Antivirus/Anti-Spyware

35
Q

Security Appliance: firewall, VPN, intrusion detection, filtering, anti-spam/mal-ware

A

UTM Unified Threat Management Systems

36
Q

Data is encrypted using a secret numerical code, called an encryption key, which transforms plain data into cipher text. Messages must be decrypted by the receiver

A

Encryption

37
Q

Encryption Method: Sender and receiver use single, shared key

A

Symmetric Key Encryption

38
Q

Uses two, mathematically related keys: Public key and private key. Sender encrypts message with recipient’s public key. Recipient decrypts with private key

A

Public Key Encryption

39
Q

Data file used to establish the identity of users and electronic assets for protection of online transactions. Using a trusted 3rd party Certification Authority (CA), CA verifies user’s identity, stores information in CA server, which generates encrypted digital certificate containing owner ID information and copy of owner’s public key

A

Digital Certificate

40
Q

Encrypts at the Transport Layer of the TCP/IP protocol

A

SSL Secure Sockets Layer and TLS successor Transport Layer Security

41
Q

Encrypts at the Application Layer of the TCP/IP protocol

A

S-HTTP Secure Hypertext Transfer Protocol

42
Q

Online transaction processing requires 100% availability, no downtime

A

Ensuring System Availability

43
Q

Contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service. For continuous availability, e.g. stock markets. Put into effect to ensure 100% availability

A

Fault-Tolerant Computer Systems

44
Q

Designing systems that recover quickly with capabilities to help operators pinpoint and correct of faults in multi-component systems

A

Recovery-Oriented Computing