Types of Information Systems and Technology Risks Flashcards
Strategic Risk
risk of choosing inappropriate technology
Operating Risk
risk of doing the right things in the wrong way
Financial Risk
risk of having financial resources lost, wasted, or stolen
Information Risk
risk of loss of data integrity, incomplete transactions, or hackers
Virus
piece of a computer program that inserts itself into some other program, including operating systems, to propagate and cause harm to files and programs. It requires a host program to propagate and cannot run independently
Worm
program that can run independently and normally propagates itself over a network. It cannot attach itself to other programs.
Trojan Horse
program that appears to have a useful function but contains a hidden and unintended function that presents a security risk
Denial of Service Attack
one computer or group of computers bombards another computer with a flood of network traffic
Phishing
sending of phony e-mails to try to lure people to phony websites where they are asked for information that will allow the phisher to impersonate the user
File attributes
set to restrict writing, reading, and/or directory privileges
Firewalls
hardware and software, of user identification and authentication that prevents unauthorized users from gaining access to network resources
acts as a gatekeeper
network and application
Packet filtering
examines packets of data as they pass through the firewall according to the rules that have been established for the source of the data, the destination of the data, and the network ports the data was sent from
Circuit level gateways
allow data into a network only when the computers inside the network request the data
Application level gateways
examine data coming into the gateway