1/282
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Where were the cyber attacks when the government called for greater response mechanisms to cyber attacks within EU
Estonia; Thinks the attacks are from Russia because Estonia moved WW2 memorial
What do hackers use in DoS attacks?
botnets (groups of computers with malicious software) to launch an attack.
Who is Dwayne Whitten?
TAMU cybersecurity
People should always have...
Backups
What is the first line of defense in business
Employees
Who was College Stations potential data breach involved with in 2009?
Click2Gov
What did the cyber attack in LA cause?
Doctors locked out of email and patient records for over a week
What is ransomware?
Viruses/malware that take over a server/computer and demand money in return
What are 2 things to do to avoid a ransomware/malware attack?
Think before you click, if something seems wrong notify the TAMU helpdesk
What is the division of IT at TAMU
IT.tamu.edu
What are DUO and Office 365 doing?
Reducing device remembering from 30 to 5 days
What is safer than public wifi?
Hot spots
What is computer security?
concerned with risk management, confidentiality, integrity, and the availability of electronic info that is processed and stored within a computing system
What is risk management?
the recognition, consequences, and assessment of risk to a computer's assets and developing strategies to manage/protect them.
It is important to backup files with...
high priority
What is a hacker?
Someone who attempts to invade/disable a computer's security to steal the computer's resources
What is a hacktivist?
Disable companies by hacking their system
What is a white hat hacker?
fake hacker that tries to hack a company to prove its security
What is the #1 weakest link of a company?
Employees
What does every TAMU employee have to do yearly?
a security module
What is an unsecured computer?
Extremely easy to breach computer; usually connected to the internet
What is an intranet?
businesses' private version of the internet
What is a firewall?
specialized hardware and software working together to ensure only authorized personnel and employees can use intranet
What is a proxy server?
Special security computer that communications in and out of a intranet pass through
What is a port?
used to contain and delay structural fire from spreading
What is "default-deny"?
Firewall rule set that standard security dictates that the only network connections that are permitted are the nes that have been explicitly allowed.
What is "default-allow"?
Firewall rule set that many business use that allow any connection except the ones that are blocked.
What are computer/metamorphic viruses?
Computer files that reproduce by making copies of them within a computers memory, storage, or network.
What is malware?
programs specifically intended to penetrate/damage a computers system without the end users knowledge
What is experimental malware?
Written as research project to further understand how to combat them
What is a worm?
Self-replicating but does not need to attach itself to an existing program to spread.
What is a trojan horse?
Typically seen as harmless, but when the program is executed, it may release harmful viruses into a computer/network; they wait for a particular computer action/date.
What is spyware?
Computer program installed to capture or take control over a system without users knowledge or consent; secretly monitors users keystrokes/behavior
What is adware?
Programs that automatically displays Ads onto a computer
What is spamming?
Abuse of an email to send millions of unsolicited messages.
What is a DoS attack?
Attempt to make a computer or its resources unavailable to its users. Uses an enormous amount of processing power to the computer to slow it down and stop its running.
What is reverse phising/keylogging?
Type of spyware; When a hacker installs a program that records every keystroke.
What is antivirus software?
Computer programs that attempt to identify, prevent, and eliminate computer viruses and malware.
What is a malevolent attachment?
Executable program that waits for an event for the program to run.
What is social engineering?
the way we socially exist and do things
What is internet fraud?
Any fraudulent activity in an online setting
What is click fraud?
Writing programs inserted into advertising network websites that automatically pass a user to the advertiser, so the click fee happens
What are purchase scams?
Most uncomplicated type of internet fraud; involves a buyer who approaches merchants via span and asks if they can pay for shipping with credit card, once order is shipped, credit card is cancelled and company looses money.
What is phishing?
Involves social engineering techniques; attempts to gain private information by sending a legitimate looking email
What is privacy?
The ability of an individual to keep their personal information out of public view; has to do with PERSONAL info
What is confidentiality?
Has to do with COMPANIES info
What does anounymus mean?
Ones personal identity is unknown
What is a tracking cookie?
Along with a webpage copy, the server sends a small text file called a cookie to keep personal information
Advantage: user doesn't have to fill out tedious information twice
Disadvantage: tracking website browsing behavior, compromising privacy
What is data mining?
when experts extract useful data and information from recorded data (cookie)
What is computer privacy?
Protecting one of its most important assets: data and information
What are history files?
A list of stored/cached websites on a users computer that are an account of where and what a user has visited on the web.
What is indentity theft/fraud?
All types of crime in that someone wrongfully obtains and uses another persons personal data in some way that involves fraud/deception, typically for economic gain
What is shoulder surfing?
Criminal glances over persons should to glean personal data
What is dumpster diving?
Criminals sift to trash to obtain personal information
What is the SCAM acronym?
S: Be Stingy
C: Check your financial information on a regular basis
A: Ask periodically for credit reprot
M: Maintain careful records of your financial records
What malware doesn't need to attach itself to an existing program to spread?
Worm
What is the most uncomplicated Internet fraud?
Purchase scam
What is the name of Google's advertising network?
Google AdSense
What is TAMU's fiscal year?
Sept 1-Aug 31
What tool should you use for transactions?
tool you should use for transactions
What is the system training TAMU employees have to do?
trianing@tamus.edu for state employees over equal employment opportunity and prevention of sexual harassment
Who is E Jerome McCarthy?
(Michigan State and Notre Dame): Developed 4 P's of marketing in 1960
What is R&D all about?
COLLABORATING
What collaboration software does TAMU use?
Filex (filex.tamu.edu)
What are the core functional business departments?
Accounting
HR
Marketing
R&D
Production
What is collaboration?
2 or more people working towards a common goal
What is a business?
Organized entity designed to sell goods/services to make a profit
Accounting Department
Language/mathematics of business; Often the most important
What is a transaction?
every business activity needs to be recorde
What is GAAP?
Accounting rules for preparing, presenting, and reporting financial statements
What is the Sarbanes Oxley Act 2002?
Enacted to encounter fraudulent reporting
What is EDGAR?
Electronic Data Gathering, Analysis, and Retrieval system): Primary system for companies submitting documents to the SEC (securities and exchange commission)
What should we use excel for versus access?
Excel: To aggregate the data
Access: To pull from data base
HR department
involved with the administration of business personnel
Roles: recruiting new employees, evaluating/managing personnel, tracking personnel data, administering payroll and pensions, and providing advice to employees.
Employee data must be...
private and accurate
What is TAMU's HR website?
Hr.tamu.edu
Marketing department
Focus on customers and have core responsibilities like advertising and branding products/services
What are the 4 Ps of marketing
Products, pricing, promotion, placement
What are products?
Actual good and services a business produces
What is pricing?
what a product costs
What is promotion?
Advertisement of a businesses products and services
What is placement?
How a product is delivered to a customer
R&D department
Takes a creative and systematic approach to evolve a businesses original idea and device new ones
If a business isnt growing...
its dying
Ideas need to be...
FEASIBLE
Brainstorming
collaborative thought process by many people come up with ideas and directions for the business
Production department
Make tangible or intangible products to be sold commercially; Focus attention on the most efficient and effective way to produce goods/services to maximize profit
What does the production department focus on?
What if analysis used to consider lots of factors
Business departments must...
COLLABORATE
What is business collaboration?
involves 2 or more people/departments working together towards a common business goal
What is business collaboration facilitated by?
Facilitated by data and information exchange
What is Data and information exchange software?
electronic computing tools
that provide data and information exchange to facilitate decisions
What is an internet discussion board?
oldest; allows users to post electronic messages to a webpage
What is a thread?
First post to discussion board
What is instant messaging/online chat?
similar to email but is real time computer communication
What is video and data conferencing?
allow businesses to collaborate through a network via video
What are webinars?
collaboration between audience and presenter
What is collaborative software considered?
management tools
What is project management software?
provides business with collaborative roadmap for organizing and managing resources to schedule a project start to finish
What is a Gantt chart?
graphical representation of project; road map