Final Exam Flashcards

1
Q

threat

A

a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owners permission and often without the owners knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

vulnerability

A

an opportunity for threats to gain access to individual or organizational assets. some exist because there are no safeguards or because the existing safeguards are ineffective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

safeguard

A

any action, device, procedure, technique or other measure that reduces a system’s vulnerability to a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

target

A

the asset that is desired by a security threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

pretexting

A

deceiving someone over the internet by pretending to be another person or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

phishing

A

a technique for obtaining unauthorized data that uses pretexting via email. the person doing the deed pretends to be a legitimate company and sends an email requesting confidential data such as account numbers, social security, account passwords etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

phisher

A

an individual or organization that spoofs legitimate companies in an attempt to illegally capture personal data such as credit card numbers email accounts and driver’s license numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

spoofing

A

when someone pretends to be someone else with the intent of obtaining unauthorized data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IP spoofing

A

a type of spoofing whereby an intruder uses another site’s IP address as if it were that other site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

email spoofing

A

a synonym for phising. a technique for obtaining unauthorized data that uses pretexting via email. fisheries direct traffic to their sites under the guise of a legitimate business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

sniffing

A

a technique for intercepting computer communications. with wired networks this action requires a physical connection to the network and with wireless networks no such connection is required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

wardriver

A

people who use computers with wireless connections to search for unprotected wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hacking

A

a form of computer crime in which a person gains unauthorized access to a computer system. although some people do this for the sheer joy of it, others invade systems for the malicious purpose of stealing or modifying data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

usurpation

A

occurs when unauthorized programs invade a computer system and replace legitimate programs. such unauthorized programs typically shut down the legitimate systems and substitute their own processing to spy, steal and manipulate data or achieve other purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

denial of service (DoS)

A

security problem in which users are not able to access an information system; can caused by human errors, natural disaster, or malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

advanced persistent threat (APT)

A

a sophisticated possibly long running computer hack that is perpetrated by large well funded organizations like governments. as means to engage in cyber warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

intrusion detection system (IDS)

A

a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

brute force attack

A

a password cracking program that tries every possible combination of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

cookies

A

a small file that is stored in the user’s computer by a browser. can be used for authentication, for storing shopping cart contents and user preferences and for other legitimate purposes. can also be used to implement spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

identification

A

the process whereby an information system identifies a user by requiring the user to sign on with a username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

authentification

A

the process whereby an information system verifies or validates a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Gramm Leach Bliley (GLB) Act

A

passed by congress in 1999, this act protects consumer financial data stored by financial institutions which are defined as banks security firms insurance companies and organizations that provide financial advice, prepare tax returns, and provide similar financial services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

privacy act of 1974

A

federal law that provides protections to individuals regarding records maintained by the US government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

health insurance portability and accountability act (HIPPA)

A

the privacy provisions of this 1996 act give individuals the right to access health data created by doctors and other healthcare providers. this also sets rules and limits on who can read and receive a person’s health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

smart cards

A

plastic cards similar to credit cards that have microchips which holds much more data than a magnetic strip is loaded with identifying data and normally requires a pin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

personal identification number (PIN)

A

a form of authentication action whereby the user supplies a number that only he or she knows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

biometric authentication

A

the use of personal physical characteristics such as fingerprints facial features and retinal scans to authenticate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

encryption

A

the process of transforming clear text into coded unintelligible text for secure storage of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

encryption algorithms

A

these are used to transform clear text into coded unintelligible text for a secure storage or communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

key

A

1) a column or group of columns that identifies a unique row in a table. also referred to as a primary key 2) a number used to encrypt data. the encryption algorithm applies the key to the original message to produce a coded message. decoding or decrypting a message is similar; a key is applied to the coded message to recover the original text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

symmetric encryption

A

an encryption method whereby the same key is used to encode and to decode the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

asymmetric encryption

A

an encryption method whereby different keys are used to encode and decode the message; one key encodes the message and the other decodes the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

public key encryption

A

a special version of asymmetric encryption that is popular on the internet. with this method,each site has a public key for encoding messages and a private key for decoding them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

https

A

an indication that a web browser is using the ssl/tls protocol to provide secure communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

secure sockets layer (SSL)

A

a protocol that uses both asymmetric and symmetric encryption. when this is in use, the browser dress will begin with https://

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

transport layer security (TLS)

A

the new name for a later version of secure sockets layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

firewall

A

computing devices located between public and private networks that prevent unauthorized access to or from the internal network. this can be a special purpose computer or it can be a program on a general purpose computer or router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

perimeter firewall

A

a firewall that sits outside the organizational network it is the first device that internet traffic encounters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

internal firewalls

A

firewalls that sit inside the organizational network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

packet filtering firewall

A

a firewall that examines each packet and determines whether to let the packet pass. to make this decision it examines the source address the destinations addresses and other data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

malware

A

viruses, worms, trojan horses, spyware and adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

virus

A

a computer program that replicates itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

payload

A

the program codes of a virus that causes unwanted or hurtful actions such as deleting programs or data or even worse modifying data in ways that are undetected by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

worm

A

a virus that irrigates itself using the internet or some other computer network. worm code is written specifically to infect another computer as quickly as possible

45
Q

spyware

A

programs installed on the user’s computer without the user’s knowledge or permission that reside in the background and unknown to the user, observe the user’s actions and keystrokes, modify computer activity and report the user’s activities to sponsoring organizations. maliciously captures keystrokes to obtain usernames passwords account numbers and other sensitive information. other types are used for marketing analyses, observing what users do, websites visited, products examined and purchased and so forth

46
Q

key logger

A

malicious spyware that captures keystrokes without the user’s knowledge. used to steal usernames passwords account numbers and other sensitive data

47
Q

adware

A

programs installed on the user’s computer without the user’s knowledge or permission that reside in the background and unknown to the user, observe the user’s actions and keystrokes, modify computer activity and report the user’s activities to sponsoring organizations benign in that id does not perform malicious acts or steal data but it does watch user activity and produce pop up ads

48
Q

malware definitions

A

patterns that exist in malware code. anti-malware vendors update these continuously and incorporate them into their products in order to better fight against malware

49
Q

SQL injection attack

A

the situation that occurs when user obtains unauthorized access to data by entering a SQL statement in a form in which one is supposed to enter a name or other data. if the or gram is improperly designed it will accept this statement and make it part of the SQL command that it issues to the DBMS

50
Q

data safeguards

A

measures used to protect databases and other data assets from threats. includes data rights and responsibilities, encryptions, backup and recovery and physical security

51
Q

data administration

A

an organization wide function that develops and enforces data policies and standards

52
Q

key escrow

A

a control procedure whereby a trusted party is given a copy of a key used to encrypt database data

53
Q

human safeguards

A

steps taken to protect against security threats by establishing appropriate procedures for users to follow during system use

54
Q

hardening

A

a term used to describe server operating systems that have been modified to make it especially difficult for them to be infiltrated by malware

55
Q

honeypots

A

false targets for computer criminals to attack. to an intruder, a honeypot looks like a particularly valuable resource, such as an unprotected web site, but in actuality the only site content is a program that determines the attackers IP address

56
Q

PRISM

A

codename for a secret global surveillance program run by the nation security agency

57
Q

freedom

A

the freedom from being observed by other people

58
Q

security

A

the state of being free from danger

59
Q

chief information officer (CIO)

A

the title of the principle manager of the IS department. over common titles are vice president of information services, director of information services and less commonly, director of computer services

60
Q

chief technology officer (CTO)

A

the title of the head of the tech group. they filter new ideas and products to identify those that are most relevant to the organization. their job requires deep knowledge of info tech and the ability to envision how new IT could affect an organization over time

61
Q

chief security officer (CSO)

A

the title of the person who manages security for all of the organization’s assets; physical plant and equipment, employees, intellectual property and digital

62
Q

chief information security officer (CISO)

A

the title of the person who manages security for the organization’s information systems and information

63
Q

steering committee

A

a group of senior managers from a company’s major business functions that works with the CIO tis et the IS priorities and decide among major IS projects and alternatives

64
Q

outsourcing

A

the process of hiring another organization to performa service. this is done to save costs to gain expertise and to free up management time

65
Q

green computing

A

environmentally conscious computing consisting of three major components; power management, virtualization and e-waste management

66
Q

application

A

synonym for application software

67
Q

business analyst

A

1) a person who understands business strategies, goals and objectives and who help businesses develop and manage business processes and information systems 2) someone who is well versed in porter’s models, organizational strategy, and systems alignment theory like COBIT and who also understands tech sufficiently well to communicate with developers

68
Q

system analyst

A

IS professionals who understand both business and technology. they are active throughout the systems development process and play a key role in moving the project from conception to conversion and ultimately maintenance. they integrate the work of the programmers, testers and users

69
Q

business process

A

1) a network of activities that generate value by transforming inputs into outputs (2) a network of activities, repositories, roles, resources and flows that interact to achieve some business function

70
Q

roles

A

in a business process, collections of activities

71
Q

resources

A

people or information system applications that are assigned to roles in business processes

72
Q

control flow

A

a BPMN symbol that documents the flow of activity in a business process

73
Q

data flow

A

a BPMN symbol that documents the movement of data among activities and repositories in a business process

74
Q

business process management (BPM)

A

a cyclical process for systematically creating, assessing and altering business processes

75
Q

as-is model

A

a model that represents the current situation and processes

76
Q

COBIT

A

a set of standard practices created by the information systems audit and control association that are used in the assessment stage of the BPM cycle to determine how well an information system complies with an organizations strategy

77
Q

object management group (OMG)

A

a software industry standards organization that created a standard set of terms and graphical notations for documenting business processes

78
Q

business processing modeling notation (BPMN)

A

standard set of terms and graphical notations for documenting business processes

79
Q

swim lane layout

A

a process diagram layout similar to swim lanes in a pool; each role in the process is shown in its own horizontal rectangle or lane; there are 5 roles hence 5 swim lanes

80
Q

systems development life cycle (SDLC)

A

the classical process used to develop information systems. the basic tasks of systems development are combined into the following phases; system definition, requirements analysis, component design, implementation and system maintenance (fix or enhance)

81
Q

requirements analysis

A

the second phase in the SDLC in which developers conduct user interviews, evaluate existing systems, determine new forms/reports/queries, identify new features and functions including security and create the data model

82
Q

cost feasibility

A

an assessment of the cost of information system development project that compares estimated costs to the available budget

83
Q

schedule feasibility

A

whether an information system can be developed within the time available

84
Q

technical feasibility

A

whether existing information technology will be able to meet the requirements of a new information system

85
Q

organizational feasibility

A

whether an information system fits within an organization’s customer culture and legal requirements

86
Q

implementation

A

in the context of the systems development life cycle, the phase following the design phase consisting of tasks to build, test and convert users to the new system

87
Q

test plan

A

groups of action and usage sequences for validation the capability of new using software

88
Q

system conversion

A

the process of converting business activity from the old system to the new

89
Q

pilot installation

A

a type of system conversion in which the organization implements the entire system on a limited portion of the business. the advantage of this is that if the system fails the failure is contained within a limited boundary. this reduces exposure of the business and also protects the new system from developing a negative reputation throughout the organizations

90
Q

phased installation

A

a type of system conversion in which the new system is installed in pieces across the organization. once a given piece works then the organization installs and tests another piece of the system until the entire system has been installed

91
Q

parallel installation

A

a type of system conversion in which the new system runs in parallel with the old one and the results of the two are reconciled for consistency. this is expensive because the organization incurs the costs of running both systems but is the safest form of installation

92
Q

plunge installation

A

a type of system cohesion in which the organization shuts off the old system and starts the new system. if the new system fails the organization is in trouble. nothing can be done until either the new system is fixed or the old system is reinstalled. because of the risk organizations should avoid this conversion style if possible. it is sometimes called direct installation

93
Q

maintenance

A

to fix the systems to do what it was supposed to do in the first place or to adapt the system to a change in requirements

94
Q

deliverables

A

work products that are the result of the completion of tasks in a development project

95
Q

work breakdown structure (WBS)

A

a hierarchy of the tasks required to complete a project for a large project, it might involve hundreds of thousands of tasks

96
Q

gantt chart

A

a timeline graphical chart that shows task dates dependencies and possibly resources

97
Q

critical path

A

the sequence of activities that determine the earliest date by which the project can be completed

98
Q

critical path analysis

A

the process by which project managers compress a schedule by moving resources typically people from non critical path tasks to critical path tasks

99
Q

trade off

A

in the project management, a balancing of three critical factors; requirements cost and time

100
Q

diseconomies of scale

A

a principle that states as development teams become larger, the average contribution per worker decreases

101
Q

brook’s law

A

the famous adage that states; adding more people to a late project makes the project later.

102
Q

work breakdown structure (WBS)

A

a hierarchy of the tasks required to complete a project; for a large project it might involve hundreds of thousands of tasks

103
Q

configuration control

A

a set of management policies practices and tools that developers se to maintain control over the project’s resources

104
Q

waterfall method

A

the assumption that one phase of the SDLC can be completed in its entirety and the project can progress without any backtracking to the next phase of the SDLC. projects seldom are that simple; backtracking is normally required

105
Q

agile development

A

an adaptive project management process that can be used for the management of many types of projects; it apples the development of information systems

106
Q

just in time design

A

data delivered tot he user at the time it is needed

107
Q

paired programming

A

the situation in which two computer programmers share the same computer and develop a computer program together

108
Q

stand up

A

15 minute meeting in which each team member states what they have done in the past day, what they will do in the coming day and any factors that are blocking his or her progress

109
Q

velocity

A

in scrum, the total number of points of work that a team can accomplish in each scrum period