Intro to MIS Chapter #8 : Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/86

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

87 Terms

1
New cards

Security

The policies, procedures, and technical measures used to preventunauthorized access, alteration, theft, or physical damage to information systems

2
New cards

Controls

The methods, policies, and organizational procedures that ensure thesafety of assets, the accuracy of records, and operational adherence to managementstandards

3
New cards

Interconnection

Systems in different locations are linked by networks.

4
New cards

Threat Actor

An individual or a group that attempts to exploit vulnerabilities to cause or force a threat to occur.

5
New cards

Client

Unauthorized access, errors

6
New cards

Communications

Tapping, sniffing, message alteration, theft,fraud

7
New cards

Corporate Servers

Hacking, malware, vandalism, denial-of-serviceattacks

8
New cards

Corporate Systems (Backend)

Theft/copying of data, alteration of data,hardware/software failure

9
New cards

Mobile Devices

Electronic devices that fit into the palm of your hand, such as personal digital assistants (PDAs), calculators, smart phones and other cell phones, electronic organizers, and handheld games.

10
New cards

Internet vulnerabilities

Network open to anyone

Size of Internet means abuses can have wide impact

Use of fixed Internet addresses with permanent connections to Internet eases identification by hackers

E-mail attachments, file downloading, and sharing

E-mail used for transmitting trade secrets

IM messages lack security, can be easily intercepted

11
New cards

Sniffer

a type of eavesdropping program that monitors information traveling over a network

12
New cards

Wifi

a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet

13
New cards

Rogue Access Points

Unauthorized wireless network access device.

14
New cards

5G

The fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks

15
New cards

Malware

software that is intended to damage or disable computers and computer systems.

16
New cards

Drive-by Download

Program which automatically downloads when a user visits a web page, usually without their knowledge or consent.

17
New cards

Malvertising

fake online advertising designed to trick into downloading malicious software onto your computer

18
New cards

Virus

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

19
New cards

Worm

A destructive computer program that bores its way through a computer's files or through a computer's network.

20
New cards

Trojan Horse

a program that appears desirable but actually contains something harmful

21
New cards

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

22
New cards

Bot

Malicious code that acts like a remotely controlled "robot" for an attacker, with other Trojan and worm capabilities.

23
New cards

Botnet

a network of internet-connected devices (computers, IoT gadgets, etc.) secretly infected with malware

24
New cards

PUP (potentially Unwanted Program)

Software that cannot definitively be classed as malicious, but may not have been chosen by or wanted by the user.

25
New cards

Keylogger

a malicious program that records keystrokes.

26
New cards

Cybercriminals

Primarily motivated by financial gain

27
New cards

Hacker

a person who uses computers to gain unauthorized access to data.

28
New cards

Ethical Hacker

An expert at breaking into systems and can attack systems on behalf of the system's owner and with the owner's consent.

29
New cards

Hacktivist

Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.

30
New cards

Cybervandalism

the electronic defacing of an existing website

31
New cards

Nation-State / Terrorist Group

Geopolitical motives

32
New cards

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

33
New cards

Spoofing

a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network

34
New cards

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

35
New cards

Spear Phishing

a phishing expedition in which the emails are carefully designed to target a particular person or organization

36
New cards

Business Email Compromise (BEC)

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage

37
New cards

Evil Twins

Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

38
New cards

Pharming

Reroutes requests for legitimate websites to false websites

39
New cards

Living off the Land (LOTL)

A tactic used by attackers that leverages existing tools and applications within an organization against itself to avoid detection.

40
New cards

Advanced Persistent Threat (APT)

a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations such as governments

41
New cards

Denial of Service (DOS) Attack

Flooding a server with false requests to crash it

42
New cards

Distributed DoS (DDoS) Attack

An attack in which multiple hosts simultaneously flood a target host with traffic, rendering the target unable to function.

43
New cards

Data Breach

The loss of control over an organization's data

44
New cards

Credential Stuffing

Brute force attack in which stolen user account names and passwords are tested against multiple websites.

45
New cards

Identity Theft

A crime that involves someone pretending to be another person in order to steal money or obtain benefits

46
New cards

Cyberwarfare

war in which a country's information systems could be paralyzed from a massive attack by destructive software

47
New cards

Cyberterrorism

Like cyber warfare, but executed by a terrorist group

48
New cards

Bug

An error in a program.

49
New cards

Zero Day Vulnerability

software vulnerability that has been previously unreported and for which no patch yet exists

50
New cards

SQL Injection Attack

occurs when users enter a SQL statement into a form in which they are supposed to enter a name or other data

51
New cards

Patch

code released by software developers that fixes a particular vulnerability

52
New cards

Patch management

management of patches

53
New cards

Software Supply Chain Attack

hackers target development environments to infect software that is then downloaded by end users

54
New cards

Deepfake

Creates bogus media—images, sound, or video—created by artificial intelligence that distort media in a way that makes it appear that a false event actually took place.

55
New cards

Prompt Injection (Jailbreaking)

Using special prompts to trick anLLM into bypassing its safety guardrails to produce harmful content.

56
New cards

HIPAA

(Health) Protects medical data.

57
New cards

Gramm-Leach-Bliley Act

(Financial) Requires security for customer data

58
New cards

Sarbanes-Oxley Act (SOX)

(Publicly Traded) Requires controls to ensurethe accuracy and integrity of financial data.

59
New cards

Electronic Evidence (ESI)

Most legal evidence is now digital

60
New cards

Digital Forensics

the discovery, collection, and analysis of evidence found on computers and networks

61
New cards

General Controls

Govern the design, security, and use of computerprograms and data files throughout the organization's IT infrastructure

62
New cards

Application Controls

Specific controls unique to each application (e.g.,payroll, order processing).

63
New cards

Input Controls

Check data for accuracy and completeness

*when data enters the system

64
New cards

Processing Controls

establish that data are complete and accurate during updating

65
New cards

Output Controls

ensure the results of processing are accurate, complete, and properly distributed

66
New cards

Risk Assessment

evaluation of the short-term and long-term risks associated with a particular activity or hazard

67
New cards

Security Policy

A document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.

68
New cards

Acceptable Use Policy

a policy that a user must agree to follow in order to be provided access to a network or to the internet

69
New cards

Disaster Recovery Planning

Devises plans for restoration of disrupted services

70
New cards

Business Continuity Planning

outlines procedures for keeping an organization operational in the event of a natural disaster or network attack

71
New cards

Identity and Access Management (IAM) Software

operating system software for administering rights and attributes to manage, enforce, and monitor user entitlements and access activities to the ERP system

72
New cards

Zero Trust

"never trust, always verify"

73
New cards

Least Privilege Access

User is only given access needed to perform job.

74
New cards

Firewall

Prevents unauthorized users from accessing a private network. Acts as a "gatekeeper" that filters network traffic.

75
New cards

Intrusion Detection Systems

A system that monitors network use for potential hacking attempts.

76
New cards

Intrusion Prevention System

Has all the features of an IDS, but can also take steps to prevent or block the suspiciousactivity.

77
New cards

Unified Threat Management

A single appliance that bundles multiple security tools (firewall, IDS/IPS, anti-malware, etc.).

78
New cards

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

79
New cards

Transport Layer Security

A protocol for managing the security of message transmissions on the Internet.

80
New cards

HTTPS

Hypertext Transfer Protocol Secure

81
New cards

Symmetric Key Encryption

The sender and receiver use a single, shared secretkey. (Fast, but securely sharing the key is a challenge)

82
New cards

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message

83
New cards

How does Public Key Encryption work?

1. Bob publishes his public encryption key

2. Alice encrypts her message to Bob using his public key

3. Bob receives the message and decrypts it using his secret decryption key.

84
New cards

Digital Certificate

a data file that identifies individuals or organizations online and is comparable to a digital signature

85
New cards

Public Key Infrastructure (PKI)

the system for issuing pairs of public and private keys and corresponding digital certificates

86
New cards

Blockchain

A digital ledger in which transactions made in bitcoin or another cryptocurrency are recorded chronologically and publicly

87
New cards

Fault Tolerant Computer System

Contains redundant hardware, software, and power supply components toprovide continuous, uninterrupted service (no downtime).