MIS Test 3 (Chapter 7) Flashcards

1
Q

Is the internet vulnerable?

A

The Internet is more vulnerable than internal networks because it is virtually open to anyone, making the organization’s information systems more vulnerable to actions from outsiders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Are wireless networks vulnerable?

A

Vulnerable to penetration because radio frequency bands are easy to scan (e.g., war driving)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Malware?

A

malicious software programs including:

  • virus
  • Worm
  • trojan horse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a virus?

A

A software program that attaches itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a worm?

A

Independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a trojan horse?

A

A software program that appears legitimate but contains a second hidden function that may cause damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a computer crime?

A

“any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a hacker?

A

An individual who intends to gain unauthorized access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is click fraud?

A

Occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is cyberterrorism?

A

The use of computer and networking technologies against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a cyberwar?

A

An organized attempt by a country’s military to disrupt or destroy the information and communications systems of another country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the health insurance probability and accountability act (HIPAA) of 1996?

A

outlines medical security and privacy rules and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the gramm-leach-billey act of 1999?

A

requires financial institutions to ensure the security and confidentiality of customer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the sarbanes-oxley act of 2002?

A

imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the security policy?

A
  • Outlines how the company is going to protect its assets.
  • Consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving those goals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the acceptable use policy?

A
  • Defines acceptable use of the firm’s information resources and computing equipment as well as the consequences for noncompliance
  • Should clarify company policy regarding privacy, user responsibility, and personal use of company equipment and networks
17
Q

What is authentication?

A
  • The ability of each party in a transaction to ascertain the identity of the other party
  • Often established using passwords, but this is problematic
  • New authentication technologies:
  • ——-Token
  • ——-Smart Card
  • ——Biometrics
18
Q

What is a token?

A

a physical device, usually small enough to fit on a key ring, designed to prove the identity of a single user

19
Q

What is a smart card?

A

a device about the size of a credit card that contains a chip formatted with access permission and other data

20
Q

What is biometric authentication?

A

based on the measurement of a physical or behavioral trait that makes each individual unique

21
Q

What is a firewall?

A

A combination of hardware and software that acts as a gatekeeper and prevents unauthorized users from accessing private networks.

22
Q

What are intrusion detection systems?

A

feature full-time monitoring tools placed at the most vulnerable points, or “hot spots”, of corporate networks to protect against suspicious network traffic and attempts to access files and databases

23
Q

What is antivirus software?

A

software designed to detect, and often eliminate, malware from an information system.

24
Q

What is encryption?

A

The process of encoding messages before they enter the network or airwaves, and then decoding at the receiving end

25
Q

What is symmetric key encryption?

A
  • Also known as secret key encryption
  • Both the sender and receiver use the same digital key to encrypt and decrypt message
  • Requires a different set of keys for each entity with whom communication takes place
  • Assumes the medium over which the key is shared is secure
26
Q

What is public key encryption?

A
  • Solves symmetric key encryption problem of having to exchange secret key
  • Uses two mathematically related digital keys – public key (widely disseminated) and private key (kept secret by owner)
  • Once key used to encrypt message, same key cannot be used to decrypt message
  • For example, sender uses recipient’s public key to encrypt message; recipient uses his/her private key to decrypt it
27
Q

What are two methods for encrypting network traffic on the web?

A
  • Secure Sockets Layer (SSL) and successor Transport Layer Security (TLS)
  • Secure Hypertext Transfer Protocol (S-HTTP)
28
Q

What is Secure Sockets Layer (SSL) and successor Transport Layer Security (TLS)?

A

Works by using public key encryption to create a secure connection between a client and a server thereby enabling any amount of data to be sent securely.

29
Q

What is Secure Hypertext Transfer Protocol (S-HTTP)?

A

Allows messages to be encapsulated in various ways, which may include encryption or the use of digital certificates. Differs from SSL in that it is designed only to transmit individual messages securely.