Pre Final Exam 360 Flashcards

1
Q

Definition: Information Security Management

A

An integrated, systematic approach that coordinates people, policies, standards, processes, and controls used to safeguard critical systems and information from internal and external security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Information is not accessible to unauthorized individuals or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Information is accurate and complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Information and systems are accessible on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definition:Virus

A

A self-replicating program that runs and spreads by modifying other programs or files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Definition:Worm

A

A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definition:Trojan horse

A

A non-self-replicating program that seems to have a useful purpose in appearance, but in reality has a different, malicious purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Definition:Spam

A

Sending unsolicited bulk information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition:Botnet (Bot)

A

A collection of software robots that overruns computers to act automatically in response to the bot-herder’s control inputs through Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Definition:Denial-of-service (DoS)

A

The prevention of authorized access to resources (such as servers) or the delaying of time-critical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definition:Spyware

A

Software secretly installed into an information system to gather information on individuals or organizations without their knowledge of; a type of malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Definition:Spoofing

A

Sending a network packet that appears to come from a source other than its actual source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Definition:Social engineering

A

Manipulating someone to take certain action that may not be in that person’s best interest such as revealing confidential information or granting access to physical assets, networks, or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Definition: Encryption

A

Preventive control providing confidentiality and privacy for data transmission and storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Plaintext is encrypted into _______

A

cyphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Symmetric Key Encryption : General Info

A

Fast and used for large data sets
the sender and the receiver use the same key to encrypt and decrypt messages
Require one key for every set of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Asymmetric Key Encryption : General Info

A

slow and is not appropriate for encrypting large data sets
uses a public and private key
AKA public-key encryption or two-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Definition:Authentication

A

Process that establishes the origin of information or determines the identity of a user, process, or device. KEY IN E-BUSINESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Common Use of encryption

A

Use asymmetric key to authenticate then use a symmetric or session key
Get the info with a public key and decrypt with private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Definition:digital signature

A

a message digest (MD) of a document (or data file) that is encrypted using the document creator’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why do we use a digital signature

A

ensure data integrity and prevent repudiation of

transactions the digital signature also authenticates the document creator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Definition:Certificate Authority (CA)

A

a trusted entity that issues and revokes digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Definition: Digital Certificate

A

a digital document issued and digitally signed by the private key of a Certificate Authority that binds the name of a subscriber to a public key

24
Q

Public Key Infrastructure (PKI):

A

a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.

25
Q

3 parts of the fraud triangle

A

Incentive: provides a reason to commit fraud
Opportunity: for fraud to be perpetrated
Rationalize: the individuals committing the fraud possess an attitude that enables them to rationalize the fraud

26
Q

What is Disaster recovery planning (DRP)

A

identifies significant events that may threaten a firm’s operations, outlining the procedures that ensure the firm’s smooth resuming of operations in the case this event occurs.

27
Q

What does the operating system do?

A
  1. ensure the integrity of the system
  2. control the flow of multiprogramming and tasks of scheduling in the computer
  3. Allocate computer resources to users and applications
  4. Manage the interfaces with the computer
28
Q

Database: Definition

A

A database is a shared collection of logically related data which meets the information needs of a firm.

29
Q

Definition: data warehouse

A

is a centralized collection of firm-wide data for a relatively long period of time

30
Q

Definition: Operational databases

A

for daily operations and often includes data for the current fiscal year only

31
Q

Definition: Data mining

A

is the process of searching for patterns in the data in a data warehouse and data analyzing these patterns for decision making

32
Q

Definition:Data governance

A

the convergence of data quality, data management, data policies, business process management, and risk management surrounding the handling of data in a firm

33
Q

Definition: LAN

A

A local area network (LAN): a group of computers, printers, and other devices connected to the same network that covers a limited geographic range

34
Q

Definition: hubs

A

(broadcasts through multiple ports)

35
Q

Definition:Switches

A

(provides a path for each pair of connections)

36
Q

Definition: Wide area networks

A

link different sites together, transmit information across geographically and cover a broad geographic area.

37
Q

Definition: Routers

A

connects different LANs, software-based intelligent devices, examines the Internet Protocol (IP) address

38
Q

Definition: Firewalls

A

a security system comprised of hardware and software that is built using routers, servers, and a variety of software; allows individuals on the corporate network to send/receive a data packet from the Internet.

39
Q

Definition: Virtual Private Network (VPN)

A

Securely connects a firm’s WANs by sending/receiving encrypted packets via virtual connections over the public Internet to distant offices, salespeople, and business partners.

40
Q

Definition: Wireless Network

A

is comprised of two fundamental architectural components: access points and stations.

41
Q

An access point logically connects

A

stations to a firm’s network.

42
Q

A station is a wireless endpoint device equipped with a wireless

A

Network Interface Card (NIC).

43
Q

Definition: Eavesdropping:

A

The attacker passively monitors wireless networks for data, including authentication credentials

44
Q

Definition: Man-in-the-Middle:

A

The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data.

45
Q

Masquerading

A

The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network.

46
Q

Message Modification

A

The attacker alters a legitimate message sent via wireless networks by deleting, adding to, changing, or reordering it.

47
Q

Message Replay

A

The attacker passively monitors transmissions via wireless networks and retransmits messages, acting as if the attacker was a legitimate user

48
Q

Misappropriation

A

The attacker steals or makes unauthorized use of a service.

49
Q

Traffic Analysis

A

The attacker passively monitors transmissions via wireless networks to identify communication patterns and participants

50
Q

Rogue Access Points

A

The attacker sets up an unsecured wireless network near the enterprise with an identical name and intercepts any messages sent by unsuspecting users that log onto it

51
Q

Management Controls

A

management of risk and information system security

52
Q

Operational Controls

A

: protecting a firm’s premise and facilities, preventing and detecting physical security breaches, and providing security training to employees, contractors, or third party users.

53
Q

Technical Controls

A

protecting a firm’s premise and facilities, preventing and detecting physical security breaches, and providing security training to employees, contractors, or third party users

54
Q

Technical Controls

A

primarily implemented and executed through mechanisms contained in computing related equipment

55
Q

Auditing around the computer

A

the black-box approach)

First calculating expected results from the transactions entered into the system

56
Q

Auditing through the computer

A

the white-box approach

The white-box approach requires auditors to understand the internal logic of the system/application being tested.