Pre Final Exam 360 Flashcards

1
Q

Definition: Information Security Management

A

An integrated, systematic approach that coordinates people, policies, standards, processes, and controls used to safeguard critical systems and information from internal and external security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Information is not accessible to unauthorized individuals or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Information is accurate and complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Information and systems are accessible on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definition:Virus

A

A self-replicating program that runs and spreads by modifying other programs or files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Definition:Worm

A

A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definition:Trojan horse

A

A non-self-replicating program that seems to have a useful purpose in appearance, but in reality has a different, malicious purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Definition:Spam

A

Sending unsolicited bulk information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition:Botnet (Bot)

A

A collection of software robots that overruns computers to act automatically in response to the bot-herder’s control inputs through Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Definition:Denial-of-service (DoS)

A

The prevention of authorized access to resources (such as servers) or the delaying of time-critical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definition:Spyware

A

Software secretly installed into an information system to gather information on individuals or organizations without their knowledge of; a type of malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Definition:Spoofing

A

Sending a network packet that appears to come from a source other than its actual source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Definition:Social engineering

A

Manipulating someone to take certain action that may not be in that person’s best interest such as revealing confidential information or granting access to physical assets, networks, or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Definition: Encryption

A

Preventive control providing confidentiality and privacy for data transmission and storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Plaintext is encrypted into _______

A

cyphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Symmetric Key Encryption : General Info

A

Fast and used for large data sets
the sender and the receiver use the same key to encrypt and decrypt messages
Require one key for every set of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Asymmetric Key Encryption : General Info

A

slow and is not appropriate for encrypting large data sets
uses a public and private key
AKA public-key encryption or two-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Definition:Authentication

A

Process that establishes the origin of information or determines the identity of a user, process, or device. KEY IN E-BUSINESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Common Use of encryption

A

Use asymmetric key to authenticate then use a symmetric or session key
Get the info with a public key and decrypt with private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Definition:digital signature

A

a message digest (MD) of a document (or data file) that is encrypted using the document creator’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why do we use a digital signature

A

ensure data integrity and prevent repudiation of

transactions the digital signature also authenticates the document creator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Definition:Certificate Authority (CA)

A

a trusted entity that issues and revokes digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Definition: Digital Certificate

A

a digital document issued and digitally signed by the private key of a Certificate Authority that binds the name of a subscriber to a public key

24
Q

Public Key Infrastructure (PKI):

A

a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.

25
3 parts of the fraud triangle
Incentive: provides a reason to commit fraud Opportunity: for fraud to be perpetrated Rationalize: the individuals committing the fraud possess an attitude that enables them to rationalize the fraud
26
What is Disaster recovery planning (DRP)
identifies significant events that may threaten a firm’s operations, outlining the procedures that ensure the firm’s smooth resuming of operations in the case this event occurs.
27
What does the operating system do?
1. ensure the integrity of the system 2. control the flow of multiprogramming and tasks of scheduling in the computer 3. Allocate computer resources to users and applications 4. Manage the interfaces with the computer
28
Database: Definition
A database is a shared collection of logically related data which meets the information needs of a firm.
29
Definition: data warehouse
is a centralized collection of firm-wide data for a relatively long period of time
30
Definition: Operational databases
for daily operations and often includes data for the current fiscal year only
31
Definition: Data mining
is the process of searching for patterns in the data in a data warehouse and data analyzing these patterns for decision making
32
Definition:Data governance
the convergence of data quality, data management, data policies, business process management, and risk management surrounding the handling of data in a firm
33
Definition: LAN
A local area network (LAN): a group of computers, printers, and other devices connected to the same network that covers a limited geographic range
34
Definition: hubs
(broadcasts through multiple ports)
35
Definition:Switches
(provides a path for each pair of connections)
36
Definition: Wide area networks
link different sites together, transmit information across geographically and cover a broad geographic area.
37
Definition: Routers
connects different LANs, software-based intelligent devices, examines the Internet Protocol (IP) address
38
Definition: Firewalls
a security system comprised of hardware and software that is built using routers, servers, and a variety of software; allows individuals on the corporate network to send/receive a data packet from the Internet.
39
Definition: Virtual Private Network (VPN)
Securely connects a firm’s WANs by sending/receiving encrypted packets via virtual connections over the public Internet to distant offices, salespeople, and business partners.
40
Definition: Wireless Network
is comprised of two fundamental architectural components: access points and stations.
41
An access point logically connects
stations to a firm’s network.
42
A station is a wireless endpoint device equipped with a wireless
Network Interface Card (NIC).
43
Definition: Eavesdropping:
The attacker passively monitors wireless networks for data, including authentication credentials
44
Definition: Man-in-the-Middle:
The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data.
45
Masquerading
The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network.
46
Message Modification
The attacker alters a legitimate message sent via wireless networks by deleting, adding to, changing, or reordering it.
47
Message Replay
The attacker passively monitors transmissions via wireless networks and retransmits messages, acting as if the attacker was a legitimate user
48
Misappropriation
The attacker steals or makes unauthorized use of a service.
49
Traffic Analysis
The attacker passively monitors transmissions via wireless networks to identify communication patterns and participants
50
Rogue Access Points
The attacker sets up an unsecured wireless network near the enterprise with an identical name and intercepts any messages sent by unsuspecting users that log onto it
51
Management Controls
management of risk and information system security
52
Operational Controls
: protecting a firm’s premise and facilities, preventing and detecting physical security breaches, and providing security training to employees, contractors, or third party users.
53
Technical Controls
protecting a firm’s premise and facilities, preventing and detecting physical security breaches, and providing security training to employees, contractors, or third party users
54
Technical Controls
primarily implemented and executed through mechanisms contained in computing related equipment
55
Auditing around the computer
the black-box approach) | First calculating expected results from the transactions entered into the system
56
Auditing through the computer
the white-box approach | The white-box approach requires auditors to understand the internal logic of the system/application being tested.