MIS Test 3 (Chapter 7) Flashcards
Is the internet vulnerable?
The Internet is more vulnerable than internal networks because it is virtually open to anyone, making the organization’s information systems more vulnerable to actions from outsiders.
Are wireless networks vulnerable?
Vulnerable to penetration because radio frequency bands are easy to scan (e.g., war driving)
What is Malware?
malicious software programs including:
- virus
- Worm
- trojan horse
What is a virus?
A software program that attaches itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions
What is a worm?
Independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs
What is a trojan horse?
A software program that appears legitimate but contains a second hidden function that may cause damage.
What is a computer crime?
“any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution.”
What is a hacker?
An individual who intends to gain unauthorized access to a computer system.
What is click fraud?
Occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase.
What is cyberterrorism?
The use of computer and networking technologies against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals.
What is a cyberwar?
An organized attempt by a country’s military to disrupt or destroy the information and communications systems of another country.
What is the health insurance probability and accountability act (HIPAA) of 1996?
outlines medical security and privacy rules and procedures
What is the gramm-leach-billey act of 1999?
requires financial institutions to ensure the security and confidentiality of customer data
What is the sarbanes-oxley act of 2002?
imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally.
What is the security policy?
- Outlines how the company is going to protect its assets.
- Consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving those goals.