4-3. Protection of Information Flashcards

(75 cards)

1
Q

Mobile device: What are examples? Benefits?

A

iPhones, androids, blackberries, tablet computers.

Benefits: Ubiquitous computing - universal data availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mobile device: risks?

A
  • User-installed applications can create security risks (e.g. spyware)
  • Loss or theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mobile device: challenges?

A
  • Redesigning displays, ensuring functionality across platforms, etc
  • Emerging technologies: Siri, Movie her, voice recognition/input, biometric identification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mobile device: what is SDLC?

A

System development life cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mobile device: what are end-user system development risks?

A
  • No knowledge or application of SDLC
  • Inadequate system testing and documentation
  • Poor data controls
  • Poor integration with existing systems
  • Poor system design
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mobile device: end-user system development risks: what is the responses?

A

Software and program development and implementation

  • third-party review and testing of user-developed programs
  • catalog and store programs in secure and off-site location

Segregation of duties

  • third-party review of data entry (if any) and report production
  • implement additional supervision and review as feasible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SBE?

A

Small business environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SBE: what are end-user computing risks?

A
  • Hard to control

* Higher risk of errors, defalcation, system failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SBE: characteristics?

A
  • Exclusively microcomputers
  • No centralized info. Technology (IT) dept often outsourced
  • Poor segregation of duties (incompatible functions often combined)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SBE: computing risks and responses?

A

Risk: Unprotected computing sites
Response: Give > attention to locked doors and secure storage (e.g. CDs, DVDs, flash drives)

Risk: Logical (electronic) access
Response: Require usernames and strong passwords, automatic log out after unused period

Risk: Data backup
Response: Outsource, or establish and enforce policies (e.g. centralized and automate through network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SBE: what is a compensating control?

A

Close involvement of knowledgeable owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile device: what items should be included in mobile applications training?

A
  • Organizational policies
  • Password maintenance and protection
  • When and how to use mobile devices
  • Procedures for lost or stolen devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mobile device: definition?

A

Transportable (ubiquitous) computing devices; that is, computing devices that can be carried from place to place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 3 approaches to consolidate data from multiple locations?

A
  1. Centralized system: data and processing at central location, user access via telecommunications channel
  2. Decentralized system: individual location processing and data, summarized data sent to central office, use is declining
  3. Distributed (hybrid) database system: distribute to locations according to need, seeks the best of centralized and decentralized, increasingly common
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Centralized system: Advantages and disadvantages?

A

A: enables better data security, consistency in processing
D: high transmission costs, input/output bottlenecks at high traffic times (end of period), slow response to information requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Decentralized system: Advantages and disadvantages?

A

A: lower transmission cost, lower processing power/storage needs at central site, lower input/output bottlenecks, higher response to local needs
D: higher data redundancy and poor information integration, higher security issues, higher hardware costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Distributed database system: Advantages and disadvantages?

A

A: better communication between locations (all connected to distributed database), more current and complete info, reduce or eliminate need for expensive central processing center
B: similar to centralized systems, cost of communications among locations, access and update conflicts among locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are computer networks?

A

2 or more computing devices; Connected by a communications channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is node?

A
  • Network access point

* A connected devices (computers, printers, headphones, etc) identified by type (linked to device protocols)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is critical about nodes and security?

A

Controlling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does node also could measure?

A

Measure of network complexity (e.g. 5 vs 30,000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is assigned to node?

A

A DNS and IP (internet protocol) address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is DNS?

A

Domain name system: translates network node into IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does network monitors do in relation to node?

A

Network monitors display node activity - status, extent of traffic, alarms (e.g. prohibited traffic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Computer network: what are components?
* Switch (0,1) and/or router - router is increasingly common. * Network Interface Card (NIC) or Network Adapter Card (NAC) * Transmission media
26
Computer network: Describe switch and/or router.
* Route traffic and may include security features. | * Routers are smarter, more complex and cost more than switches.
27
Computer network: describe Network Interface Card (NIC) or Network Adapter Card (NAC).
* Circuit board and software on each node * Translate between network and computer language * Matches to transmission media e. g. in each computer
28
Computer network: describe transmission media.
* Communication link between nodes (here a cable) | * May be wired or wireless
29
Computer network: what are types of nodes?
* Client | * Server
30
Computer network: describe client node.
* Usually an end user's microcomputer | * Uses but does not provide network resources
31
Computer network: describe server node.
*Provide services or resources to network *End-users access server resources but generally don't use directly *Server may lack keyboard and video (access through network) E.g. a file server maintains centralized application and data files. A printer server provides access to high quality printers
32
Computer network: What are types of networks?
* Local Area Networks (LANs) * Wide Area Networks (WANs) * Storage Area Networks (SANs) * Personal Area Networks (PANs)
33
Computer network: describe LANs.
* use dedicated communication lines (i.e. used only by the network) * cover limited area
34
Computer network: describe WANs.
*use public or shared communication lines (e.g. telephone lines, television cables)
35
Computer network: describe SANs.
* type of LAN * dedicated: connected storage devices to servers and other devices * centralize data storage * increasing use in cloud computing
36
Computer network: describe PANs.
* create/used by individual person * wireless: e.g. use Bluetooth (or IrDA) to connect a device (e.g. iPad) to keyboard, headset, mouse, another computer, etc * wired: use fiber optics, twisted pair, coax or other cable (e.g. Apple) to connect
37
Computer network: why necessary?
* File and data sharing/resources * Email * Printing * Remote access * Directories (locate services on the network)
38
Computer network: what are types of communication media?
* Wired: twisted pair (copper), coaxial cable, fiber optic cable * Wireless: microwave transmission, Wi-Fi or spread-spectrum radio transmission, Bluetooth, digital cellular
39
Computer network: wired: what are twisted pair?
* Originally for phone connections * Historically, slowest, least secure (e.g. easy to tap), lowest capacity, most interference of wired media (EMI=electromagnetic interference) * Low cost and common in US buildings (rapidly being replaced)
40
Computer network: wired: what is coaxial cable?
* Cable for your wired cable TV system * Faster, more secure, moderate capacity, less subject to interference * Slightly higher cost, common due to cable TV systems
41
Computer network: wired: what are fiber optic cable?
* Fast and secure, high capacity * Light pulses not electrical impulses; no electrical interference, no degradation over long distances * More expensive and often not already in US buildings
42
Computer network: wireless: what are microwave transmission?
* Use of terrestrial microwave and/or satellite microwave transmission * Primarily used in WANs
43
Computer network: wireless: what are Wi-Fi or spread-spectrum radio transmission?
* Used in both large commercial networks and small home networks * Used in LAN and also to provide access to WANs * Currently: Wi-Fi connections often slower than wired coaxial systems * (Ethernet) or fiber optic cable
44
Computer network: wireless: what are Bluetooth?
* A wireless communication protocol * Same radio frequencies as Wi-Fi * Lower power consumption and weaker connection; (10 meter range) * Provide direct communication link between 2 devices (e.g. headset and cell phone) * Used in personal area networks (PANs) * E.g. cell phone receiving signal from GPS
45
Computer network: what are advantages of wireless and wired network?
Wireless: Scalable, flexible, often lower cost, mobility Wired: Reliable, security, speed, occasionally lower cost Large LANs and WANs often include both
46
Computer network: what are 3 types of ownerships?
Private, public, cloud computing/cloud services.
47
Computer network: describe private ownership, pros/cons.
Small number of applications or restricted set of users. A: Secure, flexible, performance exceeds that of public D: Costly
48
Computer network: describe public ownership, pros/cons.
*Owned by third-party companies and leased to users. *Access is typically through dial-up circuits (e.g. what is used at Starbucks, McDonalds, etc). *Exploding use A and D: Opposite of private networks
49
Computer network: what are management tools for control?
1. Response time reports 2. Downtime reports 3. Online monitors 4. Network monitors 5. Protocol analyzers 6. Simple network management protocol (SNMP) 7. Help desk reports
50
What is Internet?
* A "network of networks" * Global network of billions of interconnected computers and networks * World's largest client-server network
51
Internet: what are 2 common protocols?
*TCP (transmission control protocol) *IP (Internet Protocol): All nodes assigned an IP address for delivery of information These are core protocol transmission on the Internet
52
Internet: what is protocol?
Rules by which a network operates and controls flow and priority of messages.
53
Internet: what is packet (or block)?
Meanings by which information is transmitted. | e.g. sent files are broken into packets.
54
Internet: what does each packet contains?
* Header: routing info (address), length, protocol (maybe), originating info * Data * Trailer: used in some systems, error detection bits, end of message identifier
55
Internet: what are most heavily used internet feature (in organizations)?
* Email | * TCP
56
Internet: what are 2 components of email?
1. Mail servers: host that deliver, forward and store mail | 2. Clients: link users to servers. Allow you to read, compose, send, and store email
57
Internet: what does TCP do?
Breaks up sent messages into IP packets | *Sent to a router(s) (sort of an internet postman - delivers packets) and delivered
58
Internet: what is url?
uniform resource locator. | Web address of a resource: e.g. the part after http://
59
Internet: what does browser do?
*Translates the url to an ip address *Sends request for URL via HTTP: e.g. "http://" says use the HTTP protocol, "https://" says use a protocol with great (SSL) security. could use "telnet://" - use telnet protocol to remote connect
60
Internet: what is HTTP?
Hypertext transfer protocol.
61
Internet: what are protocols and services?
* Simple Mail Transfer Protocol (SMTP): for email services * Internet Message Access Protocol (IMAP): permits access to remote mailboxes (e.g. on a server) as if they were local (e.g. on a client system) * File Transfer Protocol (FTP): for uploading and downloading files * Instant Messaging (IM): common for informal, internal corporate communications * Voice over IP (VoIP): for internet-based phone communications
62
Internet: what is Markup (or Tagging) languages?
Codes that indicate how parts of a file are to be processed or displayed.
63
Internet: what is html?
Hypertext markup language: core makeup language (way of tagging text for display) for web pages and the basic building-block protocol for constructing webpages.
64
Internet: what is XML?
Extensible markup language: for encoding (tagging) documents in machine-readable form.
65
Internet: what is XBRL?
Extensible business reporting language: XML based - for encoding and tagging business information such as financial information. * Used in fillings with SEC on EDGAR * Some companies now report FS in both paper and XBRIL formats
66
Internet: security: what monitoring employee use entails?
* Detect and/or prevent unauthorized uses: non-work tasks (shopping), legal issues (e.g. child pornography, gaming) * National security/political control (China, Egypt, U.S.) * Packet sniffers (view and capture sent info) * Desktop surveillance (keystroke and website logging): e.g. Wavecrest
67
Internet: what does ISP do?
Internet Service Providers provide access through; * direct connections to Internet backbone (high speed, high capacity communications line) * e.g. insight cable, Wind stream
68
Internet: what are intranets and extranets?
Private (e.g. limited access) network built using Internet protocols * Allows access to network resources through web browsers rather proprietary interface * Reduces training and system development time * Rapidly replacing traditional proprietary LANs and WANs * Easier to use, greater security * Internet portal - the entry site (URL) for an intranet
69
Internet: Describe intranets.
Available only within an organization (business, school, association). Often used to connect geographically separate LANs within a company.
70
Internet: Describe extranets.
Extend intranet to associates. | E.g. suppliers, customers, business partners. Extended beyond the company "firewall"
71
Internet: what is often used to extend an intranet to an extranet?
Use VPN (virtual private network) technology to secure communications.
72
Internet: what is Web 2.0?
2nd generation, web-based collaboration and community-generated content.
73
Internet: what are tools for Web 2.0?
* Blogs: focused discussion or (b)log led by a moderator (share ideas and opinions) * Wiki: knowledge-sharing collaborative website * Twitter: micro-variation of a blog with 140 character limit. Often "follow" friends and celebrities * RSS (really simple syndication)/ATOM feeds: news and info source by (free) subscription
74
What does repeaters do?
Strengthen the signal.
75
What does Gateways do?
Gateways connect Internet computers of dissimilar networks.