Chapter 8: Securing Information Systems Flashcards

1
Q

Digital data is vulnerable to

A

destruction, misuse, error, fraud, and hardware of software failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spoofing

A

Tricking or deceiving computer systems by hiding or faking one’s identity (fake e-mail addresses or masquerading as someone else)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sniffing

A

type of eavesdropping program that monitors information traveling over network (f.e. enables hackers to steal information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Denial-of-Service attacks (DoS) & Distributed DOS (DDoS)

A

DoS: flooding server with thousands of false requests to crash the network
DDoS: use of numerous computers to launch a DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnets

A

networks of “zombie” PC’s infiltrated by bot malware, can perform spam attacks , DoS, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identity Theft

A

Theft of personal information (social security ID, driver’s license, or credit card numbers) to impersonate someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing

A

setting up fake websites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evil twins

A

wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A

redirects users to a bogus web page, even when individual types correct Web page address into their browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Click Fraud

A

occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase - imitate users clicking on your system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internal threats: Employees

A
  • sloppy security procedures
  • both end users and IS specialists are sources of risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Software presents problems because

A
  • software bugs may be impossible to eliminate
  • software vulnerabilities can be exploited by hackers and malicious software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware

A

can disable systems and websites, with special focus on mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firms relying on computer systems for their core business functions are at risk of

A
  • losing sales and productivity due to lack of security and control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

various information assets such as business plans lose value if

A

they are released to outsiders or of they expose the firm to legal liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

electronic evidence (probative digital material) and computer forensics also require firms to

A

pay more attention to security and electronic records management

17
Q

General Controls (for IS)

A
  • overall control environment governing the design, security, and use of computer programs and the security of data files in general throughout organisation’s information technology infrastructure
  • types of general controls: software controls, hardware controls, computer operations controls, data security controls, system development controls, administrative controls
18
Q

Application Controls (for IS)

A
  • specific controls unique to each computerised application that ensure that only authorised data are completely and accurately processed by that application
  • include: input controls, processing controls, output controls
19
Q

Risk assessment

A
  • evaluate information assets
  • identify control points and control weaknesses
  • determine the most cost-effective set of controls
20
Q

Security policy

A
  • includes policies for acceptable use and identity management
  • ranks information risks
  • identifies security goals
  • mechanisms for achieving these goals
  • having coherent and tailored corporate security policies and plans for continuing business operations in case of disruption is imperative
  • AUP (acceptable use policy) defines acceptable uses of firm’s information resources & computing
21
Q

Identity management software

A
  • automates keeping track of all users and privileges
  • authenticates users, protecting identities, controlling access
22
Q

Authentication

A

password systems, tokens, smart cards, etc.

23
Q

Firewall

A

combination of hardware and software that prevents unauthorised users from accessing private networks

24
Q

Intrusion detection systems

A
  • monitor networks to detect and deter intruders
  • examines events as they are happening to discover attacks in progress
25
Viruses
rogue software program that attaches itself to other software programs or data files in order to be executed
26
Worms
independent programs that copy themselves from one computer to other over a network
27
Trojan horses
Software that appears benign but does something other than expected
28
SQL injection hacks
hackers submit data to web forms that exploits site's unprotected software and sends rogue SQL query to database
29
ransomware
encrypt files on a device, rendering an files and the system that rely on them unusable and demanding ransom for decryption
30
Spyware
gathering information about a person or organization without their knowledge though technology
31
Encryption
- transforming text or data into cipher text that cannot be read by unintended recipients - two methods: SSL (secure socket layer)/ TLS (transport security layer) and S-HTTP (Secure hypertext transfer protocol)
32
Standard used today for encryption
AES (advanced encryption standard)
33
Blockchain technology
enables companies to create and verify tamperproof transactions on a network without a central authority
34
Digital certificates combined with public key encryption
provide further protection of electronic transactions by authenticating a users identity
35
PKI (public key infrastructure)
available for anyone to use. data encrypted with the public key can only be decrypted with the private key
36
Fault-tolerant computer systems
systems can operate even when one or more parts of them fail
37
using software metrics and rigorous software testing help improve
software quality and reliability