ch 10: Information Systems Security Flashcards

(39 cards)

1
Q

what is the goal of information systems security

A

-it is really about trade offs btw security and freedom

(ex loss of freedom of choosing your own password in echnage for increased security as you are forced to create a stronger pw making it diffucult for hackers to crack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

also a trade off of what

A

cost and risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a threat

A

a person/org that seeks to obtain or alter data or other info systems assets illegally without having the owners persmission and often without the owners knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a vulnerability is

A

an opportunity for threats to gain access to individual/org assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

whats a safeguard

A

some measure that individuals/org take to block the threat from obtaining the asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the target

A

the asset that is desired by the threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the types of threats

A

-human error, computer crime, natural disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the types of losss

A

-unauthroized data disclosure
-incorrect data modification
-faulty service
-denial of service
-loss of infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

unauthorized data disclosure

A

-social engineering
-pretexting
-phishing
-spoofing
- ip/email spoofing
-sniffing
-packet sniffer/analyzer
-natural disasters
-hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

sniffing/packet sniffers

A

a technique for intercepting computer communications. with wired networks, sniffing requires a physical connection to the network. with wireless networks, no connection is required and wardrivers are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

war drivers

A

take computers with wireless connections through an area and search for unprotected wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hacking

A

activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

incorrect data modification

A

-procedures incorreclt designed or not followed
-ex increasing customers discount or incorrectly modiying employees salary
-placing incorrect data on company web site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

incorrect data modification cause

A

-improper internal controls systems
-system errors
-faulty recovery actions after a diseaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

faulty service

A

include problems that result bc of incorrect system operation
-incorrect DM
-procedural mistakes
-programming errors
-it installation errors
-usurpation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is usurpation

A

when computer criminals invade a comp system and replace legitmate probles with their own, unauthorized ones that shut down legitimate applications and
substitute their own processing to spy, steal and manipulate data, or
achieve other purposes.

17
Q

denial of service (DoS)

A

human error or lack of procedures
-humans inadvertently shut down a web server or corporate gateway router by starting a computationaly intensive application

dos attacks
-malicious hacker intentionally floods a web server with millions of bogus service requests

 -computer worms create artifical traffic so legitimate traffic cannot get thru
18
Q

loss of infrastructure

A

-human accidents
-theof/terrorist events
-disgruntled/terminated employee
-natural disasters
-advanced persistent threat (APT)

19
Q

protective actions

A

-use antiservice software
-delete browser cookies
-make appropriate trade off to protect you and ur bsuiness

20
Q

current highest computer crime

A

malicious code

21
Q

how should you respond to security threats (5)

A

-create strong pw
-use multiple pw
-take security seriously
-send no valuable data via email or im
-use https at trusted, reputable vendors

22
Q

how should organizations respond to security threats

A

senior management create company wide policies
-what sensitive data will be stored
-how will data be processed
-how will data be shared with other organizations
-how can employees and others request changes to inaccurate data

23
Q

teachincal safegaurds on

A

-hardware and software

-firewalls
-identification and authorization
-malware

24
Q

data safegaurds on data

A

-passwords
-encryption
-backup and recovery

25
human safeguards on procedures and people
-hiring -training -education
26
identification
identifies the user
27
authentication
-authenticates the user (pw) -personal identification number, biometric authentixation such as finger prints, and single sign on
28
encryption
process of transforming clear text into coded, unintelligible text for secure storage or communication
29
key
string of bits used to encrypt data (unlocks message) different for symmetric encryption and asymmetric encryption
30
symmetric encryption
the same key is used encode and to decode
31
asymmetric encryption
2 keys are used, 1 key encodes the message and the other key decods the message
32
firewalls
computing device that prevents unauthorized access -perimeter firewall sits outside the organization network -internal firewall sits inside the network -packet filtering firewall examines each part of messahe and determines whetehr to ket that part pass basing it off ip source and other data
33
spyware and adware symptoms
-slow system start up -many advertisinments -suspicious broswer homepage changes -suspicious changes to the taskbar
34
malware symptoms
-viruses -trojan horses -worms -spyware -adware -ransomeware
35
malware protections
-antivirus and antispyware systems -open emails only from known sources -install software updates
36
position definitions
-seperate duties and authorites -determine least privledge -document position sensitivity
37
dissemination and enforcement
responisbility accountability complience
38
termination
friendly/unfriendly
39
How can human safeguards protect against security threats?
Account Management – Standards for new user accounts, modification of account permissions, removal of unneeded accounts Password Management – Users change passwords frequently Help Desk Policies – Provide means of authenticating users