Finals Deck Flashcards

(43 cards)

1
Q

Encryption

A

renders message unreadable to everyone except intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Decryption

A

Revealing original meaning of encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric Key Encryption

A

Same key is used to encrypt and decrypt message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computationally Secure

A

takes too long for a hacker to crack code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hash Function

A

maps input of any size into output of fixed size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Certificate Authority

A

verifies digital signature of a trusted org.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tapping

A

Eavesdropping on telephone lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sniffing

A

Eavesdropping on computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Radiation

A

wires give off electric signal that can be intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Web Scraping

A

when computer program searches the web for info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware

A

malicious software designed to cause damage or loss of control to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computer Virus

A

Subset of Malware

software that attaches to other programs in order to be executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worm

A

Subset of Malware

similar to virus but runs on its own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan Horse

A

Subset of Malware

software that appears to be benign, but actually runs malicious software in the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

Subset of Malware

email or text that tricks user into giving sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Denial of Service Attack

A

Subset of Malware

overwhelm website by overloading with traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Spam

A

Subset of Malware

Junk email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ransomware

A

Subset of Malware

software that threatens to publish files and/or prevents use of computer until ransom is paid

19
Q

Computer Security

A

Policies, Procedures, and Technical Measures, to ensure unauthorized access, theft, interruption or physical damage does not occur to information systems

20
Q

Attack Surface

A

Different places where a hacker can gain data

21
Q

Discovery Request

A

legal request for electronic documents

22
Q

Acceptable Use Policy

A

states acceptable uses and USERS of information and computers

23
Q

Data

24
Q

Information

A

Data that is shaped into a meaningful form

25
Information Technology
all hardware and software that firms need to achieve business objectives
26
Information System
A set of interrelated components that collect, store, process, and distribute information
27
Business Intelligence
IT to help users make better business decisions
28
Management IS
IS + consideration of behavioral issues
29
Business Processes
collection of activities required to produce a product or service
30
Manufacturing and Production (BP)
Producing and Delivering products / services
31
Sales and Marketing
Selling the organizations products / services
32
Finance and Accounting
Managing the organizations financial records
33
Human Resources
Attracting, Maintaining, and Developing orgs. labour force
34
Norms
How you are expected to behave
35
Values
why you behave a certain way
36
responsibility
accepting costs duties and obligations for decisions
37
accountability
mechanism to determine who is responsible
38
liability
laws exist to allow individuals to recover damages from harm
39
due process
make sure laws are justly applied, i.e. appeal
40
privacy
right for individual to be left alone, free from surveillances
41
web beacons
track that you viewed a certain item
42
spyware
software that tracks ‘ gathers info without users knowledge
43
NORA
non-obvious relationship awareness combines data on one person from different sources to build a complete profile