Types of Information Systems and Technology Risks Flashcards

1
Q

Strategic Risk

A

risk of choosing inappropriate technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Operating Risk

A

risk of doing the right things in the wrong way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Financial Risk

A

risk of having financial resources lost, wasted, or stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information Risk

A

risk of loss of data integrity, incomplete transactions, or hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus

A

piece of a computer program that inserts itself into some other program, including operating systems, to propagate and cause harm to files and programs. It requires a host program to propagate and cannot run independently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worm

A

program that can run independently and normally propagates itself over a network. It cannot attach itself to other programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojan Horse

A

program that appears to have a useful function but contains a hidden and unintended function that presents a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Denial of Service Attack

A

one computer or group of computers bombards another computer with a flood of network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing

A

sending of phony e-mails to try to lure people to phony websites where they are asked for information that will allow the phisher to impersonate the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File attributes

A

set to restrict writing, reading, and/or directory privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Firewalls

A

hardware and software, of user identification and authentication that prevents unauthorized users from gaining access to network resources

acts as a gatekeeper

network and application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet filtering

A

examines packets of data as they pass through the firewall according to the rules that have been established for the source of the data, the destination of the data, and the network ports the data was sent from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Circuit level gateways

A

allow data into a network only when the computers inside the network request the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application level gateways

A

examine data coming into the gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly