Cybersecurity and Data Management in Information Systems

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/93

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

94 Terms

1
New cards

Data Breach

Occurs when an organization loses control of information to outsiders.

2
New cards

Information

An asset that must be protected.

3
New cards

Security

Policies, procedures, and technical measures to prevent theft, alteration, physical damage, and unauthorized access to information systems.

4
New cards

Controls

Methods, policies, and organizational procedures that ensure safety or an organization's assets, records, and operation adherence.

5
New cards

Identity Theft

A crime in which someone obtains key pieces of information to impersonate someone else.

6
New cards

Click Fraud

Occurs when an individual or computer program fraudulently clicks on an online ad without intent of making a purchase.

7
New cards

Click Farm

A business that pays employees to click on website elements to boost the status of a client's website/product.

8
New cards

CAPTCHA

A program that protects websites against bots by giving tests that humans can pass and computer programs can't.

9
New cards

Wireless security challenges

Radio frequencies bands easy to scan; both Bluetooth and Wi-Fi are susceptible to hacking.

10
New cards

War driving

Eavesdroppers drive by buildings/areas or park outside and try to intercept network traffic.

11
New cards

Malware

Malicious software, written with intent to cause annoyance or damage to a computer system or network.

12
New cards

Virus

Rogue software program that attaches itself to other software programs or data files to be executed without user knowledge or permission.

13
New cards

Worms

Independent programs that copy themselves from one computer to others over a network.

14
New cards

Trojan Horse

Software program that appears to be okay but is a destructive code intending to disrupt the computer.

15
New cards

SQL Injection Attacks

Takes advantage of vulnerabilities in poorly coded web application software to inject malicious program code into a company's system and networks.

16
New cards

Ransomware

A type of malware that tries to extort money from users by taking control of their computers.

17
New cards

Spyware

Technology that aids in gathering information about a person or organization without their knowledge.

18
New cards

Keyloggers

Monitor and record keystrokes and mouse clicks made on a computer.

19
New cards

Sniffers

Type of eavesdropping program that monitors information traveling over a network.

20
New cards

Denial of Service Attacks (DOS)

Floods a network server or web server with thousands of false requests to crash the network.

21
New cards

IoT DDoS Botnets

IoT devices are being used as a botnet to launch DDoS attacks.

22
New cards

Spoofing

Tricking or deceiving systems or users by hiding one's identity or taking the identity of another user on the internet.

23
New cards

Phishing

A high tech scam in which an e-mail requests the update or confirmation of sensitive personal information.

24
New cards

Spear Phishing

A more targeted form of phishing, messages appear to come from a trusted source.

25
New cards

Pharming

A type of phishing technique that involves web spoofing.

26
New cards

Evil Twins

A type of phishing technique involving network spoofing.

27
New cards

Insiders

Legitimate users who purposely or accidentally misuse their access of information to cause a business affecting event.

28
New cards

Hacker

A person who gains unauthorized access to a network for profit, mischief, or personal pleasure.

29
New cards

Commercial Software

Can contain flaws that create security vulnerabilities.

30
New cards

Zero Day Vulnerabilities

Holes in software that are unknown to the creator so hackers can exploit this flaw.

31
New cards

Patches

Small pieces of software released by a software vendor to repair flaws.

32
New cards

Evidence for white collar crimes

Found in digital form - data stored on computer devices, e-mail, instant messages, e-commerce transactions.

33
New cards

Proper control of data

Can save time and money when responding to legal discovery requests.

34
New cards

Computer forensics

Scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in court of law.

35
New cards

General controls

Govern design, security, and use of computer programs in general throughout organization's information technology infrastructure.

36
New cards

Application controls

Specific controls unique to each computerized application, such as payroll or order processing, ensure that only authorized data are completely and accurately processed by that application.

37
New cards

Risk assessment

Determines the level of risk to the firm if a specific activity or process is not properly controlled.

38
New cards

Security Policy

Ranks information risks, identifies acceptable security goals, and identifies mechanisms for achieving these goals.

39
New cards

Acceptable use policy (AUP)

Defines acceptable use of firm's information resources and computing equipment.

40
New cards

Authorization policies

Determine differing levels of user access to information assets.

41
New cards

Business continuity planning

Focuses on restoring business operations after a disaster.

42
New cards

Disaster recovery planning

Plans for restoration of disrupted services, focuses primarily on the technical issues involved in keeping systems up and running.

43
New cards

Backup

Copies of critical systems and data, done on a regular basis.

44
New cards

Hot site

Separate and fully equipped facility where the firm can move immediately after a disaster and resume business.

45
New cards

Cold site

Separate facility without any computer equipment but is a place employees can move after a disaster, provides a shell to get started 'computer ready.'

46
New cards

Information systems audit

Examines firm's overall security environment as well as controls governing individual information systems.

47
New cards

Identity management systems

Include business processes and technologies for identifying valid users of systems and what they are allowed to access/change.

48
New cards

Zero trust

Popular cyber security framework based on the principle of strict access controls and not trusting anyone or anything by default.

49
New cards

Authentication

The ability to know that a person is who he or she claims to be; method of confirming users' identities.

50
New cards

Authorization

Determines what actions, rights, or privileges the user has, based on the verified identity.

51
New cards

User Id

Combination of numbers, characters, and symbols used to identify a person as a legitimate user of a system.

52
New cards

Password

Combination of numbers, characters, and symbols, used to authenticate a user and allow access to a specified system.

53
New cards

Passphrase

Series of characters that is longer than a password but is still easy to memorize.

54
New cards

What attackers do

They use technology to do brute force attacks, dictionary attacks, hybrid attacks, rainbow tables.

55
New cards

Password management applications

Allow user to store username and password, along with other account details.

56
New cards

Cognitive Password

Requires the user to answer a question to verify their identity; commonly used as a form of secondary access.

57
New cards

Multifactor authentication

Validate users using a multistep process to increase security.

58
New cards

Two Factor authentication

A subset of multi factor that uses just two factors.

59
New cards

Security Token

A small electronic device to change user passcodes automatically.

60
New cards

Smart Card

A device about the same size of a credit card, containing a chip formatted with access permission and other data.

61
New cards

Terminal resource security

SW feature that erases the screen and signs the user off automatically after a specified length of inactivity.

62
New cards

Biometrics

Systems that read and interpret individual human traits to enhance security measures.

63
New cards

Issues in using biometrics

Costs, accuracy, perceived intrusiveness, effort required on part of user, cultural preferences/issues, context/environmental situation.

64
New cards

Firewall

HW and SW placed in between an organization's internal network and external network to prevent outsiders from invading private networks.

65
New cards

Intrusion detection systems (IDS)

Full time monitoring tools placed at vulnerable spots on corporate networks to detect and deter intruders.

66
New cards

Intrusion prevention systems

Same functionalities as IDS but can also block suspicious activities.

67
New cards

Anti malware SW

Prevents, detects, and removes malware.

68
New cards

Unified Threat Management systems (UTM)

Combination of firewalls and VPNs and anti spam SW.

69
New cards

Encryption

The process of encoding messages before they enter the network and then decoding them on the receiving end.

70
New cards

Digital Certificate

Data file or electronic document used to establish the identity of users and electronic assets for protection of online transactions.

71
New cards

Blockchain

A type of distributed ledger that stores a permanent and tamper proof record of transactions and shares them among a distributed network of computers.

72
New cards

Security outsourcing

Using managed security service providers.

73
New cards

Cloud computing security

Accountability and responsibility for privacy and security reside with the cloud user, although the cloud provider is actually doing the hosting.

74
New cards

Security of mobile computing devices

Must be secured like other in house, non-mobile resources against malware, theft, accidental loss, unauthorized access, and hacking attempts.

75
New cards

Enterprise Resource Planning Systems (ERP)

Integrate all departments and functions throughout an organization into a single IT system.

76
New cards

Legacy system

A system that has been in existence for a long time and that continues to be used to avoid the high cost of replacing or redesigning them.

77
New cards

Supply chain

An integrated network consisting of an organization, its suppliers, transportation companies and brokers used to deliver goods and services to customers.

78
New cards

Upstream

A firm's suppliers, suppliers' suppliers, processes for managing relationships with them.

79
New cards

Transformation

The company's internal supply chain - processing of materials/resources into semifinished and finished products/services.

80
New cards

Downstream

Organizations and processes responsible for delivering products to customers.

81
New cards

Poor SCM leads to inefficiencies

Effective SCM can support just in time strategy.

82
New cards

Pushed base model (build to stock)

Schedules based on forecasts or best guesses of demand.

83
New cards

Pull based model (demand driven, build to order)

Customer order triggers events in supply chain.

84
New cards

Customer Relationship Management systems

Capture and integrate customer data from the entire organization.

85
New cards

Customer Touch Point

A method of interaction with a customer.

86
New cards

Sales for automation CRM modules

Increases profits.

87
New cards

Marketing CRM modules

Capture prospective and current customer data.

88
New cards

Cross selling

Selling additional products or services to increase the value of the sale.

89
New cards

Up-selling

Increasing the value of the sale by selling a larger amount or size of the same product.

90
New cards

Automatic call distribution

A phone switch routes inbound calls to available agents.

91
New cards

Predictive dialing

Automatically dials outbound calls and when someone answers, the call is forwarded to an available agent/rep.

92
New cards

Interactive voice response (IVR)

Directs customers to use touch-tone phones or keywords to navigate or provide information.

93
New cards

Call scripting systems

Agent/rep can access organizational databases that track similar issues or questions.

94
New cards

Web based self service

Allows customers to use the web to find answers to their questions or solutions to their problems.

Explore top flashcards

Nisäkkäät
Updated 773d ago
flashcards Flashcards (47)
31-35
Updated 79d ago
flashcards Flashcards (69)
BIOL 375 Exam 2
Updated 1026d ago
flashcards Flashcards (76)
MB3
Updated 191d ago
flashcards Flashcards (37)
Tema 6: Contexto 2
Updated 970d ago
flashcards Flashcards (30)
Emotions and moods
Updated 187d ago
flashcards Flashcards (114)
Nisäkkäät
Updated 773d ago
flashcards Flashcards (47)
31-35
Updated 79d ago
flashcards Flashcards (69)
BIOL 375 Exam 2
Updated 1026d ago
flashcards Flashcards (76)
MB3
Updated 191d ago
flashcards Flashcards (37)
Tema 6: Contexto 2
Updated 970d ago
flashcards Flashcards (30)
Emotions and moods
Updated 187d ago
flashcards Flashcards (114)