IT Systems Securing Information Systems

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

What are the key measures for securing information systems?

Security prevents unauthorized access/damage, and controls protect assets and ensure accuracy.

2
New cards

What are the major vulnerabilities in information systems?

Network Accessibility (open networks).2. Hardware/Software Issues (breakdowns, errors).3. Disasters/Device Theft (unexpected data loss).

3
New cards

Name two major areas of security challenges and examples for each.

  • Internet Vulnerabilities: Open networks, unencrypted data, malicious emails.

  • Wireless Security: Rogue access points, war driving, unauthorized access, radio frequency bands easy to scan

4
New cards

What are examples of malicious software (malware)?

Viruses, worms, Trojans, spyware, ransomware, SQL injection, and keyloggers.

5
New cards

what are viruses and worms

  • Malicious programs that attach to legitimate files or programs and spread when those are executed.

  • Standalone malware that replicates itself to spread across networks, often exploiting security vulnerabilities, without needing a host file or user action.

6
New cards

How do worms and viruses spread?

Through downloads, email attachments, and social networks.

7
New cards

Differentiate hackers and crackers.

  • Hackers: Skilled individuals who explore and improve systems.

  • Crackers: Break into systems and bypass security for malicious purposes.

both can intrude on systems and damage them

8
New cards

Name common computer crimes

Identity theft, phishing, cyberterrorism, DoS attacks.

9
New cards

What are examples of Software vulnerability

bugs, flawa, zero day vulnerabilities, and patches

10
New cards

Why are employees a significant security risk?

They may have insider knowledge, fall victim to social engineering, or lack security training.

11
New cards

What is the impact of a security breach on a business?

Loss of business functions, legal liability, and decreased market value.

12
New cards

What are key regulations for securing information systems?

  • HIPAA: Medical data security.

  • Gramm-Leach-Bliley Act: Customer financial data.

  • Sarbanes-Oxley Act: Financial accuracy.

13
New cards

Define electronic evidence and computer forensics

  • Digital data for legal cases usually white collar crimes, saves money

  • Analyzing data for legal purposes, recovering for ambient data

14
New cards

Differentiate between general and application controls.

  • General Controls: Hardware, software, data security, govern design

  • Input, processing, and output controls for applications.

15
New cards

What is the purpose of risk assessment?

To evaluate risks if certain activities aren't controlled.

16
New cards

What are examples of security policies?

  • Ranks risks and sets goals.

  • AUP: Defines appropriate resource use.

  • Identity Management: Controls user access.

17
New cards

What is the difference between disaster recovery and business continuity?

  • Disaster Recovery: Restores disrupted services.

  • Business Continuity: Ensures operations continue after a disaster.

18
New cards

What is the purpose of security audits?

To test disaster response and identify control weaknesses.

19
New cards

Name key tools for securing information systems.

Identity management software, firewalls, intrusion detection, antivirus, UTM (unified threat mamagement).

20
New cards

Compare WEP and WPA2.

  • WEP: Basic encryption, vulnerable to attacks.

  • WPA2: Stronger, dynamic encryption, replaces WEP.

21
New cards

What are the types of encryption?

  • Symmetric Key: Shared key for encryption and decryption

  • Public Key: Key pair for secure exchanges.

22
New cards

What ensures 100% system availability?

Fault-tolerant systems with redundant components, online reansaction processing

23
New cards

What are key security measures for the cloud and mobile platforms?

Data protection, legal compliance, device management, and encryption.

24
New cards

How is software quality maintained?

Through metrics, early testing, and debugging.