M8 Flashcards

(54 cards)

1
Q

why systems are vulnerable?

A
  1. security
  2. controls
  3. accessibility of networks
  4. hardware problems
  5. software problems
  6. disasters
  7. use of networks/computers outside of firm’s control
  8. loss and theft of portable devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards

A

controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

internet vulnerabilities

A

network open to anyone
size of internet
use of fixed internet addresses with cable/DSL modems
unencrypted VOIP
email, P2P, IM (through interception, attachments, transmissions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

wireless security challenges

A
  • radio frequency bands easy to scan
  • SSIDs (Identify access points, broadcast multiple times, can be identified by sniffer programs)
  • war driving
  • rogue access points
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a type of malware that disguises itself as a legitimate program or file to trick users into running it. needs user interaction to spread

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

malicious software that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

broader term encompassing any malicious software designed to harm a computer or network

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a cyberattack that injects malicious SQL code into an application, allowing the attacker to view or modify a database.

A

SQL injection attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a type of malware that encrypts a user’s data or locks access to a computer, demanding a ransom payment for its release

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a standalone malicious program that replicates itself and spreads automatically through a network without human interaction

A

worm virus or worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

use their technical skills for a range of purposes, including ethically identifying vulnerabilities and improving system security

A

hackers aka white hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

use those skills for malicious purposes like data theft or system disruption

A

aka black hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

activities involve in computer crime

A

system intrusion
system damage
cybervandalism - intentional, disruption, defacement, destruction of website or corporate IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

involves intercepting and analyzing network traffic. passive act of capturing data

A

sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

involves disguising a communication from an unknown source as being trustworthy or legitimate, often to gain access to sensitive information or systems.

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a network of internet-connected devices, including computers, servers, and IoT devices, that have been hijacked and infected with malware

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

floods a server with traffic, making a website or resource unavailable

A

Denial-of-service attacks (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a DoS attack that uses multiple computers or machines to flood a targeted resource

A

Distributed denial-of-service attacks
(DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

unsolicited, unwanted messages or communications sent out in bulk, often with the intention of advertising, phishing, or spreading malwar

A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

who/what are the internal threats?

A

employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what creates software vulnerability?

A
  1. commercial software as it contains flaws such as bugs, zero defects
  2. patches
23
Q

this are small pieces of software to repair flaws and exploits often created faster than patches can be release and implemented

24
Q
  • Evidence for white collar crimes often in digital form
  • Proper control of data can save time and money when responding to legal discovery request
A

electronic evidence

25
- Scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in court of law – Recovery of ambient data
computer forensics
26
27
this control may be automated or manual and 2 types are: application and general controls
information systems controls
28
this controls unique to each computerized application
application controls
29
Govern design, security, and use of computer programs and security of data files in general throughout organization
general controls
30
Determines level of risk to firm if specific activity or process is not properly controlled
risk assessment
31
Ranks information risks, identifies acceptable security goals, and identifies mechanisms for achieving these goals
security policy
32
Devises plans for restoration of disrupted services
disaster recovery planning
32
Defines acceptable uses of firm’s information resources and computing equipment
acceptable use policy (AUP)
33
Focuses on restoring business operations after disaster
business continuity planning
34
2 types of audit
IS audit, security audit
35
Examines firm’s overall security environment as well as controls governing individual information systems
information systems audit
36
Review technologies, procedures, documentation, training, and personnel. May even simulate disaster to test responses
security audits
37
- List and rank control weaknesses and the probability of occurrence - Assess financial and organizational impact of each threat
role of auditing
38
– Automates keeping track of all users and privileges – Authenticates users, protecting identities, controlling access
identity management software
39
– Password systems – Tokens – Smart cards – Biometric authentication – Two-factor authentication
authentication
40
Combination of hardware and software that prevents unauthorized users from accessing private networks
firewall
41
What are the Most Important Tools and Technologies for Safeguarding Information Systems?
identity management software authentication firewall Intrusion detection system Antivirus and antispyware software Unified threat management (UTM) systems
42
Monitors hot spots on corporate networks to detect and deter intruders
Intrusion detection system
43
* Checks computers for presence of malware and can often eliminate it as well * Requires continual updating
antivirus and anti-spyware software
44
2 wireless networks
WEP security and WPA2 specification
45
* Replaces WEP with stronger standards * Continually changing, longer encryption keys
WPA2 specification
45
* Static encryption keys are relatively easy to crack * Improved if used in conjunction with VPN
WEP security
46
Transforming text or data into cipher text that cannot be read by unintended recipients
encryption
47
2 methods for encryption on networks
* Secure Sockets Layer (SSL) and successor Transport Layer Security (TLS) * Secure Hypertext Transfer Protocol (S-HTTP)
48
Two methods of encryption
Symmetric key encryption Publice Key encryption
49
Sender and receiver use single, shared key
Symmetric key encryption
50
- Uses two, mathematically related keys: public key and private key - Sender encrypts message with recipient’s public key - Recipient decrypts with private key
Public key encryption
51
* Use of public key cryptography working with certificate authority * Widely used in e-commerce
public key infrastructure (PKI)
52
Contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service
Fault-tolerant computer systems