Week one Flashcards
(55 cards)
A process for testing skills and knowledge; successful completion of a certification exam results in an endorsement by the certifying authority that an individual is capable of performing particular tasks or jobs.
Certification
A set of interrelated components that work together to support fundamental business operations, data reporting and visualization, data analysis, decision making, communications, and coordination within an organization.
Information system
A set of steps that need to be followed to achieve a specific end result, such as entering a customer order, paying a supplier invoice, or requesting a current inventory report.
Procedure
A structured set of related activities that takes input, adds value, and creates an output for the customer of that process.
process
A series (or chain) of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased.
value chain
Software that should be installed on each user’s personal computer to scan a computer’s memory and disk drives regularly for viruses.
antivirus software
The process of verifying your identity using your physiological measurements (fingerprint, shape of your face, shape of your hand, vein pattern, your iris, or retina) or behavioral measurements (voice recognition, gait, gesture, or other unique behaviors).
biometric authentication
A document that includes an organization’s disaster recovery plan, occupant emergency evacuation plan, continuity of operations plan, and incident management plan.
business continuity plan
A security concept based on confidentiality, integrity, and availability
CIA security triad
The unintended release of sensitive data or the access of sensitive data by unauthorized individuals.
data breach
A large federal agency with more than 240,000 employees and a budget of almost $65 billion whose goal is to provide for a “safer, more secure America, which is resilient against terrorism and other potential threats.
Department of Homeland Security
A cyberattack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.
distributed denial-of-service (DDoS) attack
An attack on an information system that takes advantage of a particular system vulnerability.
exploit
A backup approach that occurs when a key component is no longer functioning. Applications and other programs are automatically switched over to a redundant server, network, or database to prevent an interruption of service.
failover
The recognition that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.
reasonable assurance
A process that enables the organization to identify its potential threats, establish a benchmark of where it is, determine where it needs to be, and develop a plan to meet those needs.
security audit
An attack that takes place before the security community becomes aware of and fixes a security vulnerability.
zero-day attack
Which professional often specializes in a particular functional area?
Business analyst
True or False:
True or False: The role of the chief information officer (CIO) is to employ an IS department’s equipment and personnel to help the organization attain its goals.
True
Which professional designs and maintains Web sites, including site layout and function, to meet the client’s requirements?
Web developer
Which term is used to describe the information systems and solutions built and deployed by departments other than the information systems department?
Shadow IT
Which term refers to an attack that takes place before the security community becomes aware of and fixes a security vulnerability?
Zero-day attack
Which term describes a large group of computers that are controlled from one or more remote locations by hackers without the knowledge or consent of their legitimate owners?
Botnet
Which term refers to the deployment of malware that secretly steals data in the computer systems of organizations?
Cyberespionage