Info Systems Exam 2 Flashcards

1
Q

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

A

Cyber Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bad things happen online

A

Spyware SPAM Vishing
Adware Phishing Smishing
Malware Pharming Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hackers are not all the same

A

Script Kiddies
Sophisticated Networks
White Hats
Criminal Organizations
Black Hats
Government Sponsored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Happens to Everyone

A

The question is not “Have we been hacked”
The right question is “To what extent have we been hacked, and how vulnerable are we going forward.”
How do we respond / position ourselves. PR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You can not protect against all attacks…
You should still protect yourself from attacks.

Make sure you are a difficult target.

A

Target hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ways to Cause Issues - warez

A

Sniffing AirSnort

Spoofing Altering Packet Headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attacks - Offense

A

DoS
DDoS
Cain and Abel (Man in the middle)
Commonly associated with hotels
Brute Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attacks - Offense 2

A

Viruses Blended
Worms Logic Bombs
Trojan Horses Ransomware
Social Engineering Backdoors
SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Segments - where

A

network
drive
app or OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Segments - How

A

social engineering
technology- 0s and 1s
Policies- Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Segments - What happens

A

reveal secrets
Change data
Prevent Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Some Things To Do - Defense

A

Biometrics - fingerprints / eye scans / gait / size
Mantraps - think airlock - 2 doors, 1 at a time
Firewalls - so many meanings
Intrusion Detection Systems - IDS
“Air Gap” - talk about stuxnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Defense

A

Policies and Procedures
Audit and test

User Training
Recurring and everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot - Defense

A

A honeypot is setup to detect, and then mitigate attacks.
Think of fake email accounts used on common sites to see if they start to receive attacks after visiting a potentially dangerous site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password Policies

A

Complexity / Length / Strength
Frequency of change
Proper care for Passwords - KeePass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

you are who you claim to be

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

you have access some things

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

e-Commerce Three step process:

A

Authentication - validates identity
Confirmation - sender gets a receipt
Non Repudiation - no backing out of the deal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Return to previous state

A

Disaster Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Keep going forward

A

Business Continuity
Backups Cold Swap
Hot Swap SneakerNet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is a set of one or more fields/columns that can identify a record uniquely in a table. There can be multiple ___ Keys in one table. Each ____ Key could work as the Primary Key.

A

Candidate Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

s a set of one or more fields/columns of a table that uniquely identify a record in database table. It can not accept null as a value. No duplicate values.

A

Primary Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is a key that can be work as a primary key. Basically it is a candidate key that currently is not defined as the primary key.

A

Alternate / Alternative Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is a combination of more than one fields/columns of a table. Any of the other keys can be a ____ key simply by including multiple fields.

A

Composite / Compound Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
is a set of one or more fields/columns of a table that uniquely identify a record in database table. It is like Primary key but it can accept only one null value and it can not have duplicate values.
Unique Key
26
is a field (or set of fields) in a database table that is the primary key in another table. It can accept multiple null, duplicate values.
Foreign Key
27
Any key that is comprised of data that exists in the real world - not system generated.
Natural Key
28
A system generated key. Typically incremented integers…. 1 2 3 4
Surrogate or Artificial Key
29
UUID and GUID
Universal Unique Identifier Globally Unique Identifier - MS’s UUID
30
Issues around data
Legal What the government cares about Professional Organizations and compliance Ethical Balancing costs and benefits Standards Many different levels Personal What do you care about? Guidance Pythonic, for example
31
All kinds of language
EULA Acceptable Usage Policies Good Actor Policies Policies and Procedures - operations - NOCs Non Repudiation - No opting out
32
Compliance / Standards
PCI - PCI DSS: Payment Card Information Data Security Standard SAS 70 → SSAE 16: Auditing and reporting standards for service organizations
33
NDA
Non Disclosure Agreements
34
Non Competes -
Limited Time Limited Market - Geography Limited Market - Business Segment
35
SLA
Service Level Agreement We will try very hard to meet an agreed to standard
36
SLO
Service Level Objective We will deliver on the standard or we will pay a penalty
37
SLI
Service Level Indicator We will measure ____ to see if we are in compliance
38
IP - Not just an address
Intellectual Property - who owns the code and what can they do with it? What can you patent?
39
Globalization - The World Is Flat
Friedman defines 10 “Flatteners”: Outsourcing Informing Supply Chaining Offshoring Nearshoring Workflow Insourcing Uploading Netscape
40
The Dangers of Consulting
Partnering and clear divisions of responsibility can be very useful - they can also lead to something called “The clay layer”, as demonstrated in the video below.
41
Sharing browsing history / viewing data among many major sites provides for analytics and tailored advertisements. You can see this: Browse “porter cable air compressors” on Amazon and see how long it takes to show up on other sites you visit.
Tracking
42
A simple idea that snowballs into massive data capture and marketing. Small amount of data stored locally on the client browser between sessions. Browsers can remember things - so nice.
Cookies
43
A way to understand a sequence of website requests as a single context. Connecting data across multiple requests, so they can provide a unified experience for the end user.
Session
44
A record of each request made to a server. It ends up looking just like a database table
Log Files
45
Moving data from one location to another
Data Communication
46
Bandwidth
Broadband - multiple signals at once, reassembled at the other end Narrowband - ordered, much smaller capacity
47
As the communication travels further, it loses signal strength
Attenuation:
48
Used to connect to the network - mostly built into routers.
Modem:
49
very simple devices - not sophisticated
Hubs
50
smarter than hubs, same thing
Switches
51
Knows about other networks
Routers -
52
Manages connection to your ISP (most corporate routers do this)
Modems
53
Types of connection
From a Book - Conducted - physical connections STP / UTP / Coaxial / Fiber (Fiber Optic) Radiated - wireless Frequency ranges / Microwave / Satellite
54
how will the “handshake” be defined? What are you expecting the messages to look like? What is the agreed upon sequence of things?
Protocols
55
Running Out of Addresses
NIC - Network Interface Card IP Addresses vs MAC addresses IPv4 - IPv6 LAN / MAN / WAN
56
The dominant model is called 3-Tier or N-Tier N-Tier means there can be many, many layers
Client Server
57
Wiring & Convergence
RJ-11 - 4 wires - voice RJ-45 - 8 wires - data - A quick walkthrough Cat5 / Cat5e / Cat6 different kinds of network cables LINK Convergence - single cable, all the data!
58
Where it started
1969 - ARPNET - US Defense Department 1980’s - The Internet 1989 - The World Wide Web 1992 - First visual web browser
59
The Basic Building Blocks: Internet vs The Web
Internet = Connected computers The Web = Connected documents
60
The Basic Building Blocks
The Backbone - Core connections HTML - a standard format / language Search - A way to find “things”
61
.com / .org / .net / .mil / .edu Now it is the wild west - so many TLD
TLD - Top Level Domains