Securing Information Systems

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

flashcard set

Earn XP

Description and Tags

Flashcards about securing information systems.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

What are policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

Security

2
New cards

What are methods, policies, and organizational procedures that ensure the safety of an organization's assets and the accuracy and reliability of its accounting records?

Controls

3
New cards

What makes networks vulnerable?

Accessibility, hardware problems, software problems, disasters, use of networks outside of firm's control, and loss/theft of portable devices.

4
New cards

What are some vulnerabilities related to internet usage?

Open networks, size of the Internet allowing wide impact, fixed Internet addresses creating targets, unencrypted VOIP, and risks associated with email, P2P, and IM.

5
New cards

What are some wireless security challenges?

Easy scanning of radio frequency bands, risks associated with SSID broadcasting, war driving, and rogue access points.

6
New cards

What is Malware?

Malicious software that includes viruses, worms, Trojan horses, and spyware.

7
New cards

How do worms and viruses spread?

Through downloads, drive-by downloads, email, and IM attachments.

8
New cards

What actions are included with hackers?

System intrusion, system damage, cybervandalism, spoofing, and sniffing.

9
New cards

What are the common computer crimes?

Denial-of-service attacks, distributed denial-of-service attacks, botnets, and spam.

10
New cards

What are the common activities related to identity theft?

Phishing, evil twins, and pharming.

11
New cards

What are the methods in which internal employees are seen as security threats?

Inside knowledge, sloppy security procedures, user lack of knowledge, and social engineering.

12
New cards

What can failed computer systems lead to?

Significant or total loss of business function.

13
New cards

What does HIPPA require?

Medical security and privacy rules and procedures.

14
New cards

What does the Gramm-Leach-Bliley Act require?

Financial institutions to ensure the security and confidentiality of customer data.

15
New cards

What does the Sarbanes-Oxley Act require?

Companies and their management to safeguard the accuracy and integrity of financial information.

16
New cards

What is electronic evidence?

Evidence for white-collar crimes that is often in digital form.

17
New cards

What is computer forensics?

The scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in court of law.

18
New cards

What are general controls?

Controls that govern the design, security, and use of computer programs and the security of data files in general throughout organization.

19
New cards

What are application controls?

Controls unique to each computerized application.

20
New cards

What does risk assessment determine?

Level of risk to a firm if specific activity or process is not properly controlled.

21
New cards

What policies does security policy drive?

Acceptable use policy (AUP) and identity management.

22
New cards

What is disaster recovery planning?

Devising plans for restoration of disrupted services.

23
New cards

What is business continuity planning?

Focusing on restoring business operations after a disaster.

24
New cards

What does an information systems audit examine?

A firm’s overall security environment as well as controls governing individual information systems.

25
New cards

What does identity management software do?

Automates keeping track of all users and privileges; authenticates users, protecting identities, controlling access.

26
New cards

What is a firewall?

A combination of hardware and software that prevents unauthorized users from accessing private networks.

27
New cards

What does an intrusion detection system do?

Monitors hot spots on corporate networks to detect and deter intruders.

28
New cards

What does antivirus and antispyware software do?

Checks computers for presence of malware and can often eliminate it as well; requires continual updating.

29
New cards

What is WEP security?

Static encryption keys that can be relatively easy to crack.

30
New cards

What does the WPA2 specification offer?

Replaces WEP with stronger standards and uses continually changing, longer encryption keys.

31
New cards

What is encryption?

Transforming text or data into cipher text that cannot be read by unintended recipients.

32
New cards

What is symmetric key encryption?

Sender and receiver use single, shared key.

33
New cards

What is public key encryption?

Uses two, mathematically related keys: public key and private key.

34
New cards

What is a digital certificate?

A data file used to establish the identity of users and electronic assets for protection of online transactions.

35
New cards

What is public key infrastructure (PKI)?

The use of public key cryptography working with a certificate authority; widely used in e-commerce.

36
New cards

What are fault-tolerant computer systems?

Systems that contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service.

37
New cards

What are SLAs?

Service level agreements with 3rd party vendors.

38
New cards

What are known as objective assessments of a system in form of quantified measurements?

Software Metrics

39
New cards

What describes the review of specification or design document by small group of qualified people?

Walkthrough

40
New cards

What describes the process by which errors are eliminated?

Debugging