Info Systems Quiz 2 Flashcards

(86 cards)

1
Q

Security

A

degree of protection against criminal activity, danger, damage, or loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Security

A

all of the processes and policies designed to protect an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat

A

any danger to which a system may be exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exposure

A

harm, loss, or damage that can result if a threat compromises that resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability

A

possibility that a threat will harm that resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Five key factors contributing to increasing vulnerability of organizational information resources

A
  1. today’s interconnected, interdependent, wirelessly networked business environment
  2. smaller, faster, cheaper computers and storage devices
  3. decreasing skills necessary to be a computer hacker
  4. International organized crime taking over cybercrime
  5. lack of management support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

trusted vs untrusted network

A

trusted: any network within your organization
untrusted: any network external to your organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cybercrime

A

illegal activites conducted over computer networks, particularly the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two categories of threats to information systems

A

unintentional threats and deliberate threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unintentional threats

A

acts performed without malicious intent that nevertheless represent a serious threat to information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Human error

A

unintentional threat, higher level of employee=greater threat to security since more access to data
ex. carelessness with computing devices, opening questionable emails, careless internet surfing, poor passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social engineering

A

Attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information, such as passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social engineering techniques

A

tailgating: designed to allow the perpetrator to enter restricted areas that are controlled with locks or card entry
shoulder surfing: perpetrator watches an employee’s computer screen over the employee’s shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Deliberate threats to Information systems (ten)

A
  1. espionage or trespass
  2. information extortion
  3. sabotage or vandalism
  4. theft of equipment or information
  5. identity theft
  6. compromises to intellectual property
  7. software attacks
  8. alien software
  9. supervisory control and data acquisition (SCADA) attacks
  10. cyberterrorism and cyber warfare
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Espionage or trespass

A

unauthorized individual attempts to gain illegal access to organizational information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information extortion

A

occurs when an attacker wither threatens to steal or actually steals information from a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Sabotage or vandalism

A

deliberate acts that involve defacing an organization’s website, potentially damaging the organization’s image and causing its customer to lose faith

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Threat of equipment or information

A

computing devices and storage devices are becoming smaller yet more powerful with vastly increased storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dumpster diving

A

involves rummaging through commercial or residential trash to find discarded information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Identity theft

A

deliberate assumption of another person’s identity, usually to gain access to his or her financial information or to frame him or her for a crime
techniques: stealing mail or dumpster diving, stealing personal information from computer databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Intellectual property

A

property created by individuals or corporations that is protected under trade secret, patent, and copyright laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Trade work

A

intellectual work, such as a business plan, that is a company secret and is not based on public information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

patent

A

official document that grants the holder exclusive rights on an invention or a process for a specific period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Copyright

A

statutory grant that provides the creators or owners of intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Piracy
copying a software program without making payment to the owner-including giving a disc to a friend to install on his or her computer
26
Malware
when attackers used malicious software, to infect as many computers worldwide as possible, to the profit-driven web-based attacks of today
27
Three types of software attacks
remote attacks requiring user action, remote attacks requiring no user action, and software attacks initiated by programmers during the development of a system
28
Ransomware
digital extortion, blocks access to a computer system or encrypts an organization's data until the organization pays a sum of money
29
Spear phishing
employees receive hundreds of emails everyday many of their roles require them to download and open attachments
30
Alien software
Clandestine software that is installed on your computer through duplicitous methods
31
Adware
software that causes pop-up advertisements to appear on your screen
32
Spyware
software that collects personal information about users without their consent; keystroke loggers and screen scrapers
33
Spamware
pestware that uses your computer as a launch pad for spammers
34
Spam
unsolicited e-mail, usually advertising for products and services
35
Cookies
small amounts of information that websites store on your computer, temporarily or more or less permanently
36
SCADA
Supervisory control and data acquisition; large-scale distributed measurement and control system
37
Cyberterrorism and cyber warfare
refer to malicious acts in which attackers use a target's computer systems, particularly through the internet, to cause physical, real-world harm or severe disruption, often to carry out a political agenda
38
Controls
defense mechanisms designed to protect all of the components of an information system, including data, software, hardware, and networks
39
Three major information security controls
physical controls, access controls, and communications controls
40
Physical controls
prevent unauthorized individuals from gaining access to a company's facilities ex. walls, doors, fencing, gates, locks
41
access controls
restrict unauthorized individuals from information resources
42
two functions of access controls
authentication: confirms the identity of the person requiring access authorization: determines which actions, rights, or has, based on his or her verified identity
43
Biometrics
an authentication method that examines a person's innate physical characteristics
44
Active and passive biometric authentication
active: require the user to physically participate in the verification process by taking an action like speaking, placing a finger or eye in proximity passive: capable of identifying a person without their active participation ex. voice recognition and behavioral identification
45
Communication controls
secure movement of data across networks
46
firewall
system that prevents a specific type of information from moving between untrusted networks, such as the internet, and the private networks, such as your company's network, demilitarized zone: two firewalls
47
Anti-malware systems
antivirus are software packages that attempt to identify and eliminate viruses and worms and other malicious software
48
Whitelisting
process in which a company identifies the software that it will allow to run on its computers
49
blacklisting
allows everything to run unless it is on the blacklist, includes certain types of software that are not allowed to run in the company environment
50
Virtual private network
private network that uses a public network to connect users tunneling: encrypts each data packet to be sent and places each encrypted packet inside another packet
51
Transport layer security
encryption standard used for secure transactions such as credit card purchases and online banking
52
Public-key encryption
public key: publicly available in a directory that all parties can access private key: kept secret, never shared with anyone, and never sent across the internet
53
Certificate authority
acts as a trusted intermediary between the companies
54
Digital certificate
electronic document attached to a file that certifies that the file is from the organization it claims to be from and has not been modified from its original format
55
Virtual private network (VPN)
private network that uses a public network to connect users
56
Tunneling
encrypts each data packet to be sent and places each encrypted packet inside another packet
57
Transport layer security
aka secure socket layer ; encryption standard used for secure transactions such was credit card purchases and online banking
58
Employee monitoring system
scrutinize their employees' computers, email activities, and internet surfing activities
59
Business continuity
chain of events linking planning protection and to recovery
60
Bandwidth
transmission capacity of a network, stated in bits per second
61
Computer network
system that connects computers and other services through communications media so that data and information can be transmitted among them
62
Broadband
transmission capacity of communications medium faster than 25 megabits per second for download
63
Local area network
connects two or more devices in a limited geographical region, usually within the dame building, so that every device on the network can communicate with every other device
64
file/network server
contains various software and data for the network
65
Wide area network
WAN, network that covers a large geographical area ex. at and t
66
Routers
communications processor that routes messages from a LAN to the internet
67
Enterprise network
displays a model of enterprise computing
68
Backbone networks
high-speed central networks to which multiple smaller networks connect
69
Communication channel
consists of two types of media: cable and broadcast
70
wireline media
uses physical wires or cables to transmit data and information the alternative is broadcast media
71
Twisted pair wire
used for almost all business telephone wiring, relatively inexpensive, slow for transmitting data, can be easily tapped
72
Coaxial Cable
consist of insulated copper wire, less susceptible to electrical interference and carries more data, more expensive and harder to work with
73
Fiber-optic cable
consists of thousands of very thin filaments of glass fibers that transmit information through pulses of light generated by lasers, can transmit far more data,
74
Protocol
enable computing devices to communicate with one another
75
ethernet
network provides data transmission speeds of 100 gigabits
76
Transmission Control Protocol/internet protocol
IP, protocol of the internet, responsible for disassembling, delivering, and reassembling the data during transmission
77
Hypertext transfer protocol
defines how message are formulated and how they are interpreted by their receivers
78
Distributed processing
divides processing work among two or more computers, enables computers in different locations to communicate with one another through telecommunications links
79
Client/server computing
links two or more computers in an arrangement in some machines, called servers, provide computing services for user pc's
80
Intranet
network that uses internet protocols so that users can take advantage of familiar applications and work habits
81
Extranet
connects parts of the intranets of different organizations, enables business partners to communicate securely over the internet using VPNs
82
IP address
distinguishes computer from all other ones, consists of sets of numbers, in four parts, separated by dots
83
World Wide Web
system of universally accepted standards for storing, retrieving, formatting, and displaying information through a client/server architecture
84
Seven domains
user domain -> workstation domain -> LAN domain-> LAN-to-WAN domain-> WAN domain-> system/application domain-> remote access domain
85
Packet switching
emails, never get sent in one "package", easier to transmit data in parts rather than one place
86
Internet connection methods
Dial-up: still used in US where broadband is not available DSL: broadband access through telephone companies Cable modern: access over your cable TV coaxial cable. can have degraded performance if many of your neighbors are accessing the internet at once Satellite: access where cable and DSL are not available Wireless: very convenient, and WiMAX will increase the use of broadband wireless Fiber-to-the-home (FTTH): expensive and usually placed only in new housing developments