INFORMATION SYSTEMS: LECTURE 17 STUDY GUIDE

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:16 PM on 3/13/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

25 Terms

1
New cards

cybersecurity threat

  • an event or condition that has the potential for causing asset loss and the undesirable consequences or impact from such loss

  • Assets include: Information, Software, and Hardware

2
New cards

Causes of Asset Loss

situations and events related to adversity typically referred to as disruptions, hazards, or threats

3
New cards

Types of Asset Loss

all forms of intentional, unintentional, accidental, incidental, misuse, abuse, error, weakness, defect, fault, and/or failure events and associated conditions

4
New cards

Cybersecurity vulnerabilities

  • weaknesses in system security that can be exploited

  • System compromises can lead to:

    • They can lead to breaches, data loss, system outages, and policy violations.

    • they may stem from flaws in design, implementation, or security exposure in software.

5
New cards

Database of Software Vulnerabilities

  • Attackers exploit vulnerabilities to launch attacks.

  • Organizations maintain public databases of software vulnerabilities.

  • These databases help others prevent known security threats.

6
New cards

Cybersecurity Exploits

  • a method hackers use to exploit system vulnerabilities.

  • It includes code, commands, or exploit kits targeting security flaws.

  • enable unauthorized remote access and privilege to move deeper into the organization’s network.

7
New cards

Cybersecurity threat mitigation

includes the policies and procedures to help prevent against security incidents

8
New cards

Three Main Components of Threat Mitigation

  • Threat Prevention: Policies and procedures put in place by an organization to protect systems and data

  • Threat Identification: Security tools and oversight designed to identify specific and active security threats

  • Threat Cure: Policies, tools, and strategies used to lessen the impact of active security threats

9
New cards

Common Types of Cybersecurity Breaches

  • Viruses

  • Social Engineering

  • Spyware

  • Distributed Denial of Service (DDOS)

  • Adware

  • Malware Bots

  • Ransomeware

  • Keyloggers

10
New cards

Viruses:

  • Application: Software that infects computers, are created using code and typically must be “run” to cause harm.

  • Adverse Impact: They can damage programs or disrupt computer and network operations.

  • Key Condition: Like biological viruses, they replicate and spread but require a host file or document.

11
New cards

Social Engineering

  • manipulates people into revealing confidential information.

  • Targets include bank details, passwords, network access, and Social Security numbers.

  • These attacks exploit trust and lack of awareness about sensitive information

12
New cards

Common Social Engineering Cybersecurity Attacks

  • E-mail messages

  • Baiting Scenarios

13
New cards

Spyware

  • collects data on internet activity and user behavior.

  • It can capture keystrokes, passwords, account numbers, and confidential information.

  • Often installed through free downloads or malicious websites

14
New cards

Distributed Denial of Service (DDOS) attack

  • A cyberattack to make a computer or online service unavailable to its users.

  • It’s usually accomplished by flooding the resource with nonsensical or superfluous requests from multiple sources across the web.

15
New cards

Adware

  • collects users' web browsing history.

  • It displays ads on digital devices.

  • It forwards search history to advertisers and social media sites.

  • It gathers marketing and behavioral data.

16
New cards

Malware bots

Uses self-propagating malware that infects its host and connects back to a central server

17
New cards

Ransomware

  • malware that locks data until a ransom is paid.

  • It encrypts files and demands payment for decryption.

  • Payments are often made via untraceable methods like Bitcoin.

  • Attackers may or may not provide a decryption key after payment.

  • Some variants threaten to expose personal data if the ransom is unpaid.

18
New cards

Keyloggers

  • record keystrokes on a device.

  • They can be used on smartphones, tablets, and computers.

  • exist as hardware devices or software applications.

  • Software keyloggers are often Trojan horses installed without user awareness.

  • They can capture passwords and confidential data.

19
New cards

Chief Information Security Officer (CISO)

  • Develops policies to protect an organization’s information assets.

  • Advises on minimizing IT risks and implementing security processes.

  • Manages security incidents, tools, and protocol enforcement.

  • Typically requires a master's degree (MBA or cybersecurity)

20
New cards

Common Job Responsibilities of a CISO

  • Aligns security strategies with business goals.

  • Reports on information security risks to ensure compliance.

  • Manages security incidents to protect IT assets.

  • Oversees vendor relationships to ensure security requirements are met

21
New cards

Cybersecurity Goals

  • to protect systems, data, and information from theft, compromise, or attack.

  • Three common cybersecurity goals:

    • Protect data, information, and systems.

    • Preserve data, information, and system integrity.

    • Promote authentication to ensure authorized access and prevent unauthorized access.

22
New cards

Integrity

  • can be maintained through measures like:

    • User-access controls

    • File permissions

    • Version controls

  • Organizations must have systems to detect changes in data caused by both human and nonhuman events.

23
New cards

Authentication

  • the process of verifying the origin of information or determining an individual's or entity's identity.

  • Authentication methods aim to:

    • Prevent unauthorized access to resources.

    • Ensure authorized users have the access they need.

24
New cards

Identity Verification

used to defend IT systems and infrastructure from unauthorized access.

25
New cards

Common methods of identity verification include

  • Two-Factor Identification (2FA)

  • Knowledge-Based Authentication (KBA)

  • Multi-Factor Authentication (MFA)

  • Biometric Verification

  • Token-Based Authentication