Chapter 8 Securing Information Systems – Flashcards

Unlock all answers in this set

Unlock answers
question
Acceptable use policy (AUP), 312
answer
defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet.
question
Antivirus software, 318
answer
prevents, detects, and removes malware, including computer viruses, computer worms, Trojan horses, spyware, and adware.
question
Application controls, 310
answer
are specific controls unique to each computerized application, such as payroll or order processing.
question
Authentication, 316
answer
refers to the ability to know that a person is who he or she claims to be.
question
Biometric authentication, 316
answer
uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access.
question
Botnet, 301
answer
Perpetrators of DDoS attacks often use thousands of "zombie" PCs infected with malicious software without their owners' knowledge and organized into a
question
Bugs, 305
answer
or program code defects.
question
Business continuity planning, 314
answer
focuses on how the company can restore business operations after a disaster strikes.
question
Click fraud, 304
answer
occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase.
question
Computer crime, 302
answer
Most hacker activities are criminal offenses, and the vulnerabilities of systems we have just described make them targets for other types of
question
Computer forensics, 309
answer
is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
question
Computer virus, 298
answer
is a rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission. Most computer viruses deliver a "payload."
question
Controls, 295
answer
are methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its records, and operational adherence to management standards.
question
Cybervandalism, 300
answer
the intentional disruption, defacement, or even destruction of a Web site or corporate information system.
question
Cyberwarfare, 304
answer
is a state-sponsored activity designed to cripple and defeat another state or nation by penetrating its computers or networks for the purposes of causing damage and disruption.
question
Deep packet inspection (DPI), 322
answer
helps solve this problem. DPI examines data files and sorts out low-priority online material while assigning higher priority to business-critical files.
question
Denial-of-service (DoS) attack, 301
answer
attack uses numerous computers to inundate and overwhelm the network from numerous launch points.
question
Digital certificates, 320
answer
are data files used to establish the identity of users and electronic assets for protection of online transactions
question
Disaster recovery planning, 314
answer
devises plans for the restoration of computing and communications services after they have been disrupted
question
Distributed denial-of-service (DDoS) attack, 301
answer
hackers flood a network server or Web server with many thousands of false communications or requests for services to crash the network
question
Downtime, 321
answer
refers to periods of time in which a system is not operational.
question
Drive-by download, 298
answer
consisting of malware that comes with a downloaded file that a user intentionally or unintentionally requests.
question
Encryption, 319
answer
is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver.
question
Evil twin, 303
answer
are wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet, such as those in airport lounges, hotels, or coffee shops.
question
Fault-tolerant computer systems, 321
answer
contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service.
question
Firewall, 317
answer
prevent unauthorized users from accessing private networks. A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
question
General controls, 310
answer
govern the design, security, and use of computer programs and the security of data files in general through- out the organization's information technology infrastructure.
question
Gramm-Leach-Bliley Act, 309
answer
after its congressional sponsors. This act requires financial institutions to ensure the security and confidentiality of customer data.
question
Hacker, 300
answer
is an individual who intends to gain unauthorized access to a computer system
question
High-availability computing, 321
answer
Fault tolerance should be distinguished from
question
HIPAA, 308
answer
outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data between health care providers, payers, and plans.
question
Identity management, 312
answer
consists of business processes and software tools for identifying the valid users of a system and controlling their access to system resources
question
Identity theft, 302
answer
is a crime in which an imposter obtains key pieces of personal information, such as social security identification numbers, driver's license numbers, or credit card numbers, to impersonate some- one else.
question
Intrusion detection systems, 318
answer
feature full-time monitoring tools placed at the most vulnerable points or "hot spots" of corporate networks to detect and deter intruders continually.
question
Keyloggers, 300
answer
record every keystroke made on a computer to steal serial numbers for software, to launch Internet attacks, to gain access to e-mail accounts, to obtain passwords to protected computer systems, or to pick up personal information such as credit card numbers.
question
Malware, 298
answer
and include a variety of threats, such as computer viruses, worms, and Trojan horses.
question
Managed security service providers (MSSPs), 322
answer
that monitor network activity and perform vulnerability testing and intrusion detection.
question
MIS audit, 314
answer
examines the firm's overall security environment as well as controls governing individual information systems.
question
Online transaction processing, 321
answer
transactions entered online are immediately processed by the computer.
question
Password, 316
answer
known only to authorized users
question
Patches, 307
answer
To correct software flaws once they are identified, the software vendor creates small pieces of software called
question
Pharming, 303
answer
redirects users to a bogus Web page, even when the individual types the correct Web page address into his or her browser.
question
Phishing, 303
answer
involves setting up fake Web sites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.
question
Public key encryption, 320
answer
uses two keys: one shared (or public) and one totally private
question
Public key infrastructure (PKI), 320
answer
the use of public key cryptography working with a CA, is now widely used in e-commerce
question
Recovery-oriented computing, 321
answer
Researchers are exploring ways to make computing systems recover even more rapidly when mishaps occur, an approach called
question
Risk assessment, 311
answer
determines the level of risk to the firm if a specific activity or process is not properly controlled.
question
Sarbanes-Oxley Act, 309
answer
after its sponsors Senator Paul Sarbanes of Maryland and Representative Michael Oxley of Ohio.
question
Secure Hypertext Transfer Protocol (S-HTTP), 319
answer
is another protocol used for encrypting data flowing over the Internet, but it is limited to individual messages, whereas SSL and TLS are designed to establish a secure connection between two computers.
question
Secure Sockets Layer (SSL), 319
answer
its successor Transport Layer Security (TLS) enable client and server computers to manage encryption and decryption activities as they communicate with each other during a secure Web session.
question
Security, 295
answer
refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
question
Security policy, 312
answer
consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
question
Smart card, 316
answer
is a device about the size of a credit card that contains a chip formatted with access permission and other data. (Smart cards are also used in electronic payment systems.)
question
Sniffer, 301
answer
is a type of eavesdropping program that monitors information traveling over a network.
question
Social engineering, 305
answer
Malicious intruders seeking system access sometimes trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information
question
Spoofing, 301
answer
also may involve redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination.
question
Spyware, 300
answer
annoying, and some critics worry about its infringement on computer users' privacy.
question
SQL injection attack, 300
answer
have become a major malware threat. SQL injection attacks take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company's systems and networks.
question
Token, 316
answer
is a physical device, similar to an identification card, that is designed to prove the identity of a single user.
question
Trojan horse, 299
answer
is a software program that appears to be benign but then does something other than expected.
question
Unified threat management (UTM), 319
answer
To help businesses reduce costs and improve manageability, security vendors have combined into a single appliance various security tools, including firewalls, virtual private networks, intrusion detection systems, and Web content filtering and antispam software.
question
War driving, 297
answer
in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic.
question
Worms, 298
answer
which are independent computer programs that copy themselves from one computer to other computers over a network.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New