MIS: Exam 4 - Ch 8 Flashcards

1
Q

Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Methods, policies and organizational procedures that ensure safety of organizations assets, accuracy/reliability of records, and operating standards.

A

Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information security expert who attacks a system on behalf of it’s owners/developers in an effort to identify vulnerabilities that a malicious hacker could exploit.

A

Ethical Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A non-technical method of intrusion that relies heavily on human interactions and deception in order to gain access to protected systems and/or information.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provides some security by assigning unique name to network’s SSID (service set identifiers) and not broadcasting SSID. Using it with VPN technology

A

WEP (Wired Equivalent Privacy) Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uses continually changing keys and encrypted authentication system with central server. Replaced WEP with stronger standards. Wi-Fi Alliance finalized it.

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rogue software program that attaches itself to other software programs or data files in order to be executed

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Independent computer programs that copy themselves from one computer to other computers over a network.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software program that appears to be benign but then does something other than expected.

A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hackers submit data to Web forms that exploits site’s unprotected software and sends rogue SQL query to database

A

SQL Injection Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks

A

Key Loggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Hackers and Crackers have in common?

A

Both gain access by finding and exploiting security weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Used to denote a Hacker with criminal intent

A

Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution.

A

Computer Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In computer crime, the computer may be the _______ of crime OR the _______ of crime

A

Computer may be target of crime OR instrument of crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Computer/Cyber crime activities include:

A

system intrusion, system damage, Hacktivism, Cybervandalism

19
Q

Intentional disruption, defacement, destruction of Web site or corporate information system

A

Cybervandalism

20
Q

Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else OR Redirecting Web link to address different from intended one, with site masquerading as intended destination

21
Q

Eavesdropping program that monitors information traveling over network. Enables hackers to steal proprietary information such as e-mail, company files, etc.

22
Q

Flooding server with thousands of false requests to crash the system/network.

A

DOS - Denial of Service Attacks

23
Q

Use of numerous computers to launch a DoS

A

DDos - Distributed Denial-of-service attacks

24
Q

Networks of “zombie” PCs infiltrated by malware. Worldwide, 6 - 24 million computers serve as zombie PCs in thousands of ______s

25
Medical security and privacy rules and procedures
HIPAA
26
Requires financial institutions to ensure the security and confidentiality of customer data
Gramm-Leach-Bliley Act
27
Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally
Sarbanes-Oxley Act
28
Example of authentication method, Something you know:
Password
29
Example of authentication method, Something you have:
Smart Card / Token
30
Example of authentication method, Something you are:
Biometric Authentication - Finger prints, iris, voice recognition
31
Combination of hardware and software that prevents unauthorized users from accessing private networks. Scans and identifies network traffic
Firewall
32
Place between the Corporate Network and the WWW where certain info can be accessed from outside the company while the rest of the corporate network is guarded by 2 firewalls.
Demilitarized Zone
33
Monitor hot spots on corporate networks to detect and deter intruders. Examines events as they are happening to discover attacks in progress
Intrusion Detection System
34
Checks computers for presence of malware and can often eliminate it as well. Requires continual updating
Antivirus/Anti-Spyware
35
Security Appliance: firewall, VPN, intrusion detection, filtering, anti-spam/mal-ware
UTM Unified Threat Management Systems
36
Data is encrypted using a secret numerical code, called an encryption key, which transforms plain data into cipher text. Messages must be decrypted by the receiver
Encryption
37
Encryption Method: Sender and receiver use single, shared key
Symmetric Key Encryption
38
Uses two, mathematically related keys: Public key and private key. Sender encrypts message with recipient’s public key. Recipient decrypts with private key
Public Key Encryption
39
Data file used to establish the identity of users and electronic assets for protection of online transactions. Using a trusted 3rd party Certification Authority (CA), CA verifies user’s identity, stores information in CA server, which generates encrypted digital certificate containing owner ID information and copy of owner’s public key
Digital Certificate
40
Encrypts at the Transport Layer of the TCP/IP protocol
SSL Secure Sockets Layer and TLS successor Transport Layer Security
41
Encrypts at the Application Layer of the TCP/IP protocol
S-HTTP Secure Hypertext Transfer Protocol
42
Online transaction processing requires 100% availability, no downtime
Ensuring System Availability
43
Contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service. For continuous availability, e.g. stock markets. Put into effect to ensure 100% availability
Fault-Tolerant Computer Systems
44
Designing systems that recover quickly with capabilities to help operators pinpoint and correct of faults in multi-component systems
Recovery-Oriented Computing