MIS Test 3 (Chapter 7) Flashcards
(29 cards)
Is the internet vulnerable?
The Internet is more vulnerable than internal networks because it is virtually open to anyone, making the organization’s information systems more vulnerable to actions from outsiders.
Are wireless networks vulnerable?
Vulnerable to penetration because radio frequency bands are easy to scan (e.g., war driving)
What is Malware?
malicious software programs including:
- virus
- Worm
- trojan horse
What is a virus?
A software program that attaches itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions
What is a worm?
Independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs
What is a trojan horse?
A software program that appears legitimate but contains a second hidden function that may cause damage.
What is a computer crime?
“any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution.”
What is a hacker?
An individual who intends to gain unauthorized access to a computer system.
What is click fraud?
Occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase.
What is cyberterrorism?
The use of computer and networking technologies against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals.
What is a cyberwar?
An organized attempt by a country’s military to disrupt or destroy the information and communications systems of another country.
What is the health insurance probability and accountability act (HIPAA) of 1996?
outlines medical security and privacy rules and procedures
What is the gramm-leach-billey act of 1999?
requires financial institutions to ensure the security and confidentiality of customer data
What is the sarbanes-oxley act of 2002?
imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally.
What is the security policy?
- Outlines how the company is going to protect its assets.
- Consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving those goals.
What is the acceptable use policy?
- Defines acceptable use of the firm’s information resources and computing equipment as well as the consequences for noncompliance
- Should clarify company policy regarding privacy, user responsibility, and personal use of company equipment and networks
What is authentication?
- The ability of each party in a transaction to ascertain the identity of the other party
- Often established using passwords, but this is problematic
- New authentication technologies:
- ——-Token
- ——-Smart Card
- ——Biometrics
What is a token?
a physical device, usually small enough to fit on a key ring, designed to prove the identity of a single user
What is a smart card?
a device about the size of a credit card that contains a chip formatted with access permission and other data
What is biometric authentication?
based on the measurement of a physical or behavioral trait that makes each individual unique
What is a firewall?
A combination of hardware and software that acts as a gatekeeper and prevents unauthorized users from accessing private networks.
What are intrusion detection systems?
feature full-time monitoring tools placed at the most vulnerable points, or “hot spots”, of corporate networks to protect against suspicious network traffic and attempts to access files and databases
What is antivirus software?
software designed to detect, and often eliminate, malware from an information system.
What is encryption?
The process of encoding messages before they enter the network or airwaves, and then decoding at the receiving end