C954 - MIS Infrastructure/Information Security - Section 5 with expert curated questions and answers

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

ransomeware

This is a form of malware designed to encrypt files, rendering them unusable. The ransomware creators demand a ransom in exchange for decryption.

2
New cards

spyware

A special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission

3
New cards

adware

Software that claims to serve some useful function and often fulfils that function but also allows internet advertisers to display advertisements without the user's consent

4
New cards

worm

Software that spreads itself not only from file to file but also from computer to computer

5
New cards

virus

Software written with malicious intent to cause annoyance or damage

6
New cards

drive-by hacking

A hacking attempt made from outside your home or facility using wireless transmissions

7
New cards

agile MIS infrastructure

Includes the hardware, software, and telecommunications equipment that, when combined, provide the underlining foundation to support the organizational goals

8
New cards

sustainable MIS infrastructure

Identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

9
New cards

fault tolerance

The ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service

10
New cards

failover

This occurs when a redundant storage server offers an exact replica of the real-time data; if the primary server crashes, the users are automatically directed to the secondary server or backup server

11
New cards

disaster recovery plan

A corporate plan that specifies which employees will participate in business recovery and their duties, as well as what hardware, software, and facilities will be used; includes a detailed process for recovering information or a system in the event of catastrophic disaster and should be based on general conditions, not specific scenarios

12
New cards

hot site

A separate and fully equipped facility where the company can move immediately after a disaster and resume business

13
New cards

cold site

A backup facility with the needed electrical and physical infrastructure of a computer facility, without computer equipment operating

14
New cards

warm site

A separate facility with computer equipment that requires installation and configuration

15
New cards

disaster recovery cost curve

Charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time

<p>Charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time</p>
16
New cards

business continuity planning (BCP)

Details how a company recovers and restores critical business operations and systems after a disaster or extended disruption

17
New cards

technology recovery strategy

Focus specifically on prioritizing the order for restoring hardware, software, and data that best meets business recovery requirements

18
New cards

web accessibility initiative (WAI)

Brings together people from industries, disability organizations, government, and research labs from around the world to develop guidelines and resources to make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities

19
New cards

portability

Refers to the ability of an application to operate on different devices or software platforms, such as a different operating system

20
New cards

pretexting

A form of social engineering in which one individual lies to obtain confidential data about another individual

21
New cards

vulnerability

System weaknesses that can be exploited by a threat—for example, a password that is never changed or a system that is left on while an employee goes to lunch

22
New cards

scalability

Describes how well a system can scale up or adapt to increased demand of growth

23
New cards

capacity planning

Determines future environmental infrastructure requirements to ensure high-quality system performance

24
New cards

serviceability

How quickly a third-party vendor can change a system to ensure it meets users' needs in terms of agreed levels of reliability, maintainability, or availability

25
New cards

individual information security

Details how an organization will implement an information security policy plan

26
New cards

pharming attack

A group of computers on which a hacker has planted zombie programs

27
New cards

zombie farm

Used often by an organized crime association to launch a massive phishing attack​

28
New cards

authentication

A method for confirming users' identities

29
New cards

authorization

The process of providing a user with permissions, including access level, file access, hours of access, and amount of allocated storage space

30
New cards

smart card

A device about the size of a credit card, containing embedded technologies that can store information and a small amount of software to perform limited processing

31
New cards

security token

A peripheral device used to gain access to an electronically restricted resource; used in addition to or in place of a password and acts like an electronic key to gain access

32
New cards

biometrics

The identification of a user based on a physical characteristic such as their fingerprint, iris, face, voice, or handwriting

33
New cards

two-factor (double) authentication

Requires the user to provide two means of authentication

34
New cards

privilege escalation

An attacker gains additional privileges by taking over another account that has additional permissions or by increasing the level of permissions for their account

35
New cards

vertical privilege escalation

Attackers grant themselves a higher access level, allowing the attacker to perform illegal actions, such as running unauthorized code or deleting data.

36
New cards

horizontal privilege escalation

Attackers grant themselves the same access levels they already have but assume the identity of other users.

37
New cards

advanced encryption standard (AES

Introduced by the National Institute of Standards and Technology (NIST), ___ ___ ___ is an encryption standard designed to keep government information secure

38
New cards

decryption

Decodes information and is the opposite of encryption

39
New cards

firewall

Hardware or software that guards a private network by analyzing the information leaving and entering the network, thus preventing unauthorized access by an intruder

40
New cards

cyberterrorism

The use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals

41
New cards

phishing expedition

A masquerading attack that combines spam with spoofing

42
New cards

denial of service (DoS)

A software attack that attempts to make a computer resource unavailable to its intended users, using a valid request sent in rapid or hyper repetition.

43
New cards

destructive agent

A malicious agent designed by spammers and other internet attackers to farm email addresses of websites or deposit spyware on machines

44
New cards

information secrecy

The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity

45
New cards

spear phishing

A phishing expedition where the emails are carefully designed to target a particular person or organization

46
New cards

vishing (or voice phishing)

A phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information

47
New cards

intrusion detection software (IDS)

Features full-time monitoring tools that search for patterns in network traffic to identify intruders ex (Mcaffee)

48
New cards

content filtering

Occurs when organizations use software that filters content to prevent the transmission of unauthorized information