Vulnerability of Information Systems Flashcards
Antivirus Software
An antivirus program is a software program that scans files on the
network against known virus patterns.
Cloud Computing
Cloud computing refers to Internet-based computing, where
computers obtain infrastructure such as software and information
from common centers on demand.
CRM System
A customer-relationship management (CRM) system manages the
company’s client interactions, such as in sales, marketing, and
customer service.
Data Mining and Visualization
System
A data mining and visualization system derives patterns from data.
E-Commerce System
An e-commerce system is used for buying and selling products or
providing services over the Internet.
ERP System
An enterprise resource planning (ERP) system supports and
integrates the various functions within the organization, including
planning, manufacturing, sales, marketing, and accounting.
Firewall
A firewall is a piece of a hardware or software program that prevents
hackers, viruses, and worms from reaching a computer or network
on the Internet.
MIS
A management information system (MIS) provides information
needed to effectively manage an organization.
Proxy Server
A proxy server is an enhanced firewall that intercepts incoming and
outgoing traffic over the network. It also masks the true network
address.
RFID
Radio-frequency identification (RFID) technology involves the use of
tags that can be read using radio waves for the purpose of
identification of an object, person, or animal. RFID are small tags
that can be read by sensors and, as an example, can track products
at supermarkets and other places. They should not be confused with
universal product codes (UPCs), which are still the most popular
method of scanning and reading bar codes on most products at
checkout.
Transaction Processing
System
A transaction processing system manages the data transactions of
an organization.
DNS (Domain Name Service)
resolves domain names to IP addresses
FTP (File Transfer Protocol)
transfers data over a network from one computer to another
HTTP (Hypertext Transfer Protocol)
used for Web pages
HTTPS: HTTP using SSL
HTTPS
HTTP using SSL
IMAP (Internet Message Access Protocol)
an e-mail receiving protocol that maintains messages on a server
LDAP (Lightweight Directory Access Protocol)
provides logon to network environments
POP3 (Post Office Protocol Version 3)
an e-mail receiving protocol for MTA-to-UA transmissions
SMTP (Simple Mail Transfer Protocol)
an e-mail sending protocol for UA-to-MTA or MTA-to-MTA transmissions
SSL (Secure Sockets Layer)
a cryptographic protocol that provides secure communications on the Internet (there are hundreds of these protocols - this is an illustrative example).
Telnet
a protocol for virtual terminal-to-host network connections
TFTP (Trivial File Transfer Protocol)
a simple, basic file transfer protocol with limited functionalities
X.500 Directory Service
the OSI directory service
AES (Advanced Encryption Standard)
an NIST standard secret key encryption algorithm
ASN.1 (Abstract Syntax Notation One)
an ISO and ITU standard for describing abstract data structures for encoding and decoding data for transmission
CDR (Common Data Representation)
a protocol used to represent data that is passed in CORBA object invocations
ITU-T X.216/ISO 8822
the OSI presentation service definition
ITU-T X.226/ISO 8823
the OSI connection-oriented presentation protocol specification
Java Serialization
a Java communication mechanism that saves and restores an object
Bot-network operators
Bot-network operators are hackers; however, instead of breaking into systems for the challenge or bragging rights, they take over multiple systems in order to coordinate attacks and to distribute phishing schemes, spam, and malware attacks. The services of these networks are sometimes made available in underground markets (e.g., purchasing a denial-of-service attack, servers to relay spam, or phishing attacks, etc.).
Criminal groups
Criminal groups seek to attack systems for monetary gain. Specifically, organized crime groups are using spam, phishing, and spyware/malware to commit identity theft and online fraud. International corporate spies and organized crime organizations also pose a threat to the United States through their ability to conduct industrial espionage and large-scale monetary theft and to hire or develop hacker talent.