ISTM 210 Chapter 11, ISTM 210 Chapter 12, ISTM 210 Chapter 13, ISTM 210 Chapter 14, ISTM 210 EXAM 3 HTML

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/282

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

283 Terms

1
New cards

Where were the cyber attacks when the government called for greater response mechanisms to cyber attacks within EU

Estonia; Thinks the attacks are from Russia because Estonia moved WW2 memorial

2
New cards

What do hackers use in DoS attacks?

botnets (groups of computers with malicious software) to launch an attack.

3
New cards

Who is Dwayne Whitten?

TAMU cybersecurity

4
New cards

People should always have...

Backups

5
New cards

What is the first line of defense in business

Employees

6
New cards

Who was College Stations potential data breach involved with in 2009?

Click2Gov

7
New cards

What did the cyber attack in LA cause?

Doctors locked out of email and patient records for over a week

8
New cards

What is ransomware?

Viruses/malware that take over a server/computer and demand money in return

9
New cards

What are 2 things to do to avoid a ransomware/malware attack?

Think before you click, if something seems wrong notify the TAMU helpdesk

10
New cards

What is the division of IT at TAMU

IT.tamu.edu

11
New cards

What are DUO and Office 365 doing?

Reducing device remembering from 30 to 5 days

12
New cards

What is safer than public wifi?

Hot spots

13
New cards

What is computer security?

concerned with risk management, confidentiality, integrity, and the availability of electronic info that is processed and stored within a computing system

14
New cards

What is risk management?

the recognition, consequences, and assessment of risk to a computer's assets and developing strategies to manage/protect them.

15
New cards

It is important to backup files with...

high priority

16
New cards

What is a hacker?

Someone who attempts to invade/disable a computer's security to steal the computer's resources

17
New cards

What is a hacktivist?

Disable companies by hacking their system

18
New cards

What is a white hat hacker?

fake hacker that tries to hack a company to prove its security

19
New cards

What is the #1 weakest link of a company?

Employees

20
New cards

What does every TAMU employee have to do yearly?

a security module

21
New cards

What is an unsecured computer?

Extremely easy to breach computer; usually connected to the internet

22
New cards

What is an intranet?

businesses' private version of the internet

23
New cards

What is a firewall?

specialized hardware and software working together to ensure only authorized personnel and employees can use intranet

24
New cards

What is a proxy server?

Special security computer that communications in and out of a intranet pass through

25
New cards

What is a port?

used to contain and delay structural fire from spreading

26
New cards

What is "default-deny"?

Firewall rule set that standard security dictates that the only network connections that are permitted are the nes that have been explicitly allowed.

27
New cards

What is "default-allow"?

Firewall rule set that many business use that allow any connection except the ones that are blocked.

28
New cards

What are computer/metamorphic viruses?

Computer files that reproduce by making copies of them within a computers memory, storage, or network.

29
New cards

What is malware?

programs specifically intended to penetrate/damage a computers system without the end users knowledge

30
New cards

What is experimental malware?

Written as research project to further understand how to combat them

31
New cards

What is a worm?

Self-replicating but does not need to attach itself to an existing program to spread.

32
New cards

What is a trojan horse?

Typically seen as harmless, but when the program is executed, it may release harmful viruses into a computer/network; they wait for a particular computer action/date.

33
New cards

What is spyware?

Computer program installed to capture or take control over a system without users knowledge or consent; secretly monitors users keystrokes/behavior

34
New cards

What is adware?

Programs that automatically displays Ads onto a computer

35
New cards

What is spamming?

Abuse of an email to send millions of unsolicited messages.

36
New cards

What is a DoS attack?

Attempt to make a computer or its resources unavailable to its users. Uses an enormous amount of processing power to the computer to slow it down and stop its running.

37
New cards

What is reverse phising/keylogging?

Type of spyware; When a hacker installs a program that records every keystroke.

38
New cards

What is antivirus software?

Computer programs that attempt to identify, prevent, and eliminate computer viruses and malware.

39
New cards

What is a malevolent attachment?

Executable program that waits for an event for the program to run.

40
New cards

What is social engineering?

the way we socially exist and do things

41
New cards

What is internet fraud?

Any fraudulent activity in an online setting

42
New cards

What is click fraud?

Writing programs inserted into advertising network websites that automatically pass a user to the advertiser, so the click fee happens

43
New cards

What are purchase scams?

Most uncomplicated type of internet fraud; involves a buyer who approaches merchants via span and asks if they can pay for shipping with credit card, once order is shipped, credit card is cancelled and company looses money.

44
New cards

What is phishing?

Involves social engineering techniques; attempts to gain private information by sending a legitimate looking email

45
New cards

What is privacy?

The ability of an individual to keep their personal information out of public view; has to do with PERSONAL info

46
New cards

What is confidentiality?

Has to do with COMPANIES info

47
New cards

What does anounymus mean?

Ones personal identity is unknown

48
New cards

What is a tracking cookie?

Along with a webpage copy, the server sends a small text file called a cookie to keep personal information

Advantage: user doesn't have to fill out tedious information twice

Disadvantage: tracking website browsing behavior, compromising privacy

49
New cards

What is data mining?

when experts extract useful data and information from recorded data (cookie)

50
New cards

What is computer privacy?

Protecting one of its most important assets: data and information

51
New cards

What are history files?

A list of stored/cached websites on a users computer that are an account of where and what a user has visited on the web.

52
New cards

What is indentity theft/fraud?

All types of crime in that someone wrongfully obtains and uses another persons personal data in some way that involves fraud/deception, typically for economic gain

53
New cards

What is shoulder surfing?

Criminal glances over persons should to glean personal data

54
New cards

What is dumpster diving?

Criminals sift to trash to obtain personal information

55
New cards

What is the SCAM acronym?

S: Be Stingy

C: Check your financial information on a regular basis

A: Ask periodically for credit reprot

M: Maintain careful records of your financial records

56
New cards

What malware doesn't need to attach itself to an existing program to spread?

Worm

57
New cards

What is the most uncomplicated Internet fraud?

Purchase scam

58
New cards

What is the name of Google's advertising network?

Google AdSense

59
New cards

What is TAMU's fiscal year?

Sept 1-Aug 31

60
New cards

What tool should you use for transactions?

tool you should use for transactions

61
New cards

What is the system training TAMU employees have to do?

trianing@tamus.edu for state employees over equal employment opportunity and prevention of sexual harassment

62
New cards

Who is E Jerome McCarthy?

(Michigan State and Notre Dame): Developed 4 P's of marketing in 1960

63
New cards

What is R&D all about?

COLLABORATING

64
New cards

What collaboration software does TAMU use?

Filex (filex.tamu.edu)

65
New cards

What are the core functional business departments?

Accounting

HR

Marketing

R&D

Production

66
New cards

What is collaboration?

2 or more people working towards a common goal

67
New cards

What is a business?

Organized entity designed to sell goods/services to make a profit

68
New cards

Accounting Department

Language/mathematics of business; Often the most important

69
New cards

What is a transaction?

every business activity needs to be recorde

70
New cards

What is GAAP?

Accounting rules for preparing, presenting, and reporting financial statements

71
New cards

What is the Sarbanes Oxley Act 2002?

Enacted to encounter fraudulent reporting

72
New cards

What is EDGAR?

Electronic Data Gathering, Analysis, and Retrieval system): Primary system for companies submitting documents to the SEC (securities and exchange commission)

73
New cards

What should we use excel for versus access?

Excel: To aggregate the data

Access: To pull from data base

74
New cards

HR department

involved with the administration of business personnel

Roles: recruiting new employees, evaluating/managing personnel, tracking personnel data, administering payroll and pensions, and providing advice to employees.

75
New cards

Employee data must be...

private and accurate

76
New cards

What is TAMU's HR website?

Hr.tamu.edu

77
New cards

Marketing department

Focus on customers and have core responsibilities like advertising and branding products/services

78
New cards

What are the 4 Ps of marketing

Products, pricing, promotion, placement

79
New cards

What are products?

Actual good and services a business produces

80
New cards

What is pricing?

what a product costs

81
New cards

What is promotion?

Advertisement of a businesses products and services

82
New cards

What is placement?

How a product is delivered to a customer

83
New cards

R&D department

Takes a creative and systematic approach to evolve a businesses original idea and device new ones

84
New cards

If a business isnt growing...

its dying

85
New cards

Ideas need to be...

FEASIBLE

86
New cards

Brainstorming

collaborative thought process by many people come up with ideas and directions for the business

87
New cards

Production department

Make tangible or intangible products to be sold commercially; Focus attention on the most efficient and effective way to produce goods/services to maximize profit

88
New cards

What does the production department focus on?

What if analysis used to consider lots of factors

89
New cards

Business departments must...

COLLABORATE

90
New cards

What is business collaboration?

involves 2 or more people/departments working together towards a common business goal

91
New cards

What is business collaboration facilitated by?

Facilitated by data and information exchange

92
New cards

What is Data and information exchange software?

electronic computing tools

that provide data and information exchange to facilitate decisions

93
New cards

What is an internet discussion board?

oldest; allows users to post electronic messages to a webpage

94
New cards

What is a thread?

First post to discussion board

95
New cards

What is instant messaging/online chat?

similar to email but is real time computer communication

96
New cards

What is video and data conferencing?

allow businesses to collaborate through a network via video

97
New cards

What are webinars?

collaboration between audience and presenter

98
New cards

What is collaborative software considered?

management tools

99
New cards

What is project management software?

provides business with collaborative roadmap for organizing and managing resources to schedule a project start to finish

100
New cards

What is a Gantt chart?

graphical representation of project; road map