IT Systems Securing Information Systems

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions
Get a hint
Hint

What are the key measures for securing information systems?

1 / 23

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

24 Terms

1

What are the key measures for securing information systems?

Security prevents unauthorized access/damage, and controls protect assets and ensure accuracy.

New cards
2

What are the major vulnerabilities in information systems?

Network Accessibility (open networks).2. Hardware/Software Issues (breakdowns, errors).3. Disasters/Device Theft (unexpected data loss).

New cards
3

Name two major areas of security challenges and examples for each.

  • Internet Vulnerabilities: Open networks, unencrypted data, malicious emails.

  • Wireless Security: Rogue access points, war driving, unauthorized access, radio frequency bands easy to scan

New cards
4

What are examples of malicious software (malware)?

Viruses, worms, Trojans, spyware, ransomware, SQL injection, and keyloggers.

New cards
5

what are viruses and worms

  • Malicious programs that attach to legitimate files or programs and spread when those are executed.

  • Standalone malware that replicates itself to spread across networks, often exploiting security vulnerabilities, without needing a host file or user action.

New cards
6

How do worms and viruses spread?

Through downloads, email attachments, and social networks.

New cards
7

Differentiate hackers and crackers.

  • Hackers: Skilled individuals who explore and improve systems.

  • Crackers: Break into systems and bypass security for malicious purposes.

both can intrude on systems and damage them

New cards
8

Name common computer crimes

Identity theft, phishing, cyberterrorism, DoS attacks.

New cards
9

What are examples of Software vulnerability

bugs, flawa, zero day vulnerabilities, and patches

New cards
10

Why are employees a significant security risk?

They may have insider knowledge, fall victim to social engineering, or lack security training.

New cards
11

What is the impact of a security breach on a business?

Loss of business functions, legal liability, and decreased market value.

New cards
12

What are key regulations for securing information systems?

  • HIPAA: Medical data security.

  • Gramm-Leach-Bliley Act: Customer financial data.

  • Sarbanes-Oxley Act: Financial accuracy.

New cards
13

Define electronic evidence and computer forensics

  • Digital data for legal cases usually white collar crimes, saves money

  • Analyzing data for legal purposes, recovering for ambient data

New cards
14

Differentiate between general and application controls.

  • General Controls: Hardware, software, data security, govern design

  • Input, processing, and output controls for applications.

New cards
15

What is the purpose of risk assessment?

To evaluate risks if certain activities aren't controlled.

New cards
16

What are examples of security policies?

  • Ranks risks and sets goals.

  • AUP: Defines appropriate resource use.

  • Identity Management: Controls user access.

New cards
17

What is the difference between disaster recovery and business continuity?

  • Disaster Recovery: Restores disrupted services.

  • Business Continuity: Ensures operations continue after a disaster.

New cards
18

What is the purpose of security audits?

To test disaster response and identify control weaknesses.

New cards
19

Name key tools for securing information systems.

Identity management software, firewalls, intrusion detection, antivirus, UTM (unified threat mamagement).

New cards
20

Compare WEP and WPA2.

  • WEP: Basic encryption, vulnerable to attacks.

  • WPA2: Stronger, dynamic encryption, replaces WEP.

New cards
21

What are the types of encryption?

  • Symmetric Key: Shared key for encryption and decryption

  • Public Key: Key pair for secure exchanges.

New cards
22

What ensures 100% system availability?

Fault-tolerant systems with redundant components, online reansaction processing

New cards
23

What are key security measures for the cloud and mobile platforms?

Data protection, legal compliance, device management, and encryption.

New cards
24

How is software quality maintained?

Through metrics, early testing, and debugging.

New cards
robot