Chapter 8 - Securing Information Systems Flashcards

(47 cards)

1
Q

Controls

A

Methods, policies, and organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its records, and operational adherence to management standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threats to Internet and other networks

A

Tapping, sniffing, message alteration, theft and fraud, radiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threats to corporate servers

A

Hacking, malware, theft and fraud, vandalism, DoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threats to corporate systems

A

Theft of data, copying data, alteration of data, hardware failure, software failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

War driving

A

Eavesdroppers drive by buildings or parks outside and try to intercept wireless network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

Malicious software programs like viruses, worms, and Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computer virus

A

Rogue software program that attaches itself to other software programs or data files to be execuuted, usually without user knowledge or permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worms

A

Independent computer programs that copy themselves from one computer to other computers over a network. Can operate on their own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Drive-by downloads

A

Malware that comes with a downloaded file that a user intentionally or unintentionally requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SQL injection attack

A

Exploit vulnerabilities in poorly coded web application software to introduce malicious program code into a company’s systems and networks. These vulnerabilities occur when a web application fails to validate properly or filter data a user enters on a web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ransomware

A

Attempts to extort money by taking control of computers, blocking access to files, or displaying annoying pop-up messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware

A

Monirot a user’s web-surfing activity and serve up advertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Keyloggers

A

Record every keystroke made on a computer to steal serial numbers for software, to launch Internet attacks, to gain access to email accounts, to obtain passwords to protect computer systems, or to pick up personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spoofing

A

Hiding true identity with fake email addresses or web links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sniffer

A

Eavesdropping program that monitors information traveling over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Evil twins

A

Wireless networks that pretend to offer trustworthy Wi-Fi connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Pharming

A

Redirects users to a bogus web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Click fraud

A

When an individual or computer program fraudulently clicks an online ad without any intention of learning more about the advertiser or making a purchase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Zero-day vulnerabilities

A

Holes in software that are unknown to its creators

20
Q

Gramm-Leach Bliley Act

A

Also known as the US Financial Services Modernization Act of 1999. It requires financial institutions to ensure the security and confidentiality of customer data. Data must be stored on a secure medium, and special security measures must be enforced to protect such data on storage media and during transmittal.

21
Q

Sarbanes-Oxley Act

A

It imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally.

22
Q

Computer forensics

A

The scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

23
Q

General Controls

A

Govern the design, security, and use of computer programs and the security of data files in general througout the organization’s information technology infrastructure.

24
Q

Application Controls

A

Specific controls unique to each computerized application, such as payroll or order processing. They can be classified as input controls, processing controlls, or output controls.

25
Input Controls
Check data for accuracy and completeness when they enter the system.
26
Processing controls
Establish that data are complete and accurate during updating.
27
Output controls
Ensure that the results of computer processing are accurate, complete, and properly distributed.
28
Risk Assessment
Determines the level of risk to the firm if a specfici activity or process is not properly controlled.
29
Security Policy
Statements ranking risks, identifying acceptable security goals, and identifying the mechanisms for acheiving these goals.
30
Acceptable Use Policy (AUP)
Defines acceptable uses of the firm's information resources and computing equipment.
31
Information Systems Audit
Examines the firm's overall security environment as well as controls governing individual information systems. It lists and ranks all control weaknesses and estimates the probability of their occurrence. It then assesses the financial and organizsational impact of each threat.
32
Token
A physical device, similar to an identification card, that is designed to prove the identity of a single user.
33
Smart card
A device about the size of a credit card that contains a chip formatted with access permission and other data.
34
Biometric Authentication
Uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices to grant or deny access.
35
Two-factor Authentication
Increases security by validating users through a multi-step process
36
Firewalls
A combination of hardware and software that prevents unauthorizsed users from accessing private networks. It examines names, IP addresses, applications, and other characteristics of incoming traffic.
37
Packet Filtering
Examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet, examining individual packets in isolation.
38
Intrusion Detection Systems
Feature full-time monitoring tools placed at the most vulnerable points or hot spots of corporate networks to detect and deter intruders continually.
39
Unified Threat Management (UTM) Systems
Comprehensive security management products with various security tools, including firewalls, cirtual private networks, intrusion detection systems, web content filtering, and anti-spam software.
40
Encryption
The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver.
41
Secure Sockets Layer (SSL)
Enable client and server computer to manage encryption and decryption activities as they communicate with each other during a secure web session.
42
Secure Hypertext Transfer Protocol (S-HTTP)
Used for encrypting data flowing over the Internet, but it is limited to individual messages.
43
Public Key Encryption
A more secure form of encruption that uses two keys, one shared (public) and another totally private.
44
Digital Certificates
Data files used to establish the identity of users and electronic assets for protection of online transactions. They use a trusted third party, known as a certificate authority (CA), to validate a user's identity.
45
Fault-tolerant computer systems
Contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service.
46
Managed Security Service Provider (MSSPs)
Businesses that monitor network activity and perform vulnerability tewsting and intrustion detection. Many companies outsource them.
47
Digital Resiliency
How to maintain and increase the resilience of an organization and its business processes in an all-pervasive digital environment.