INFORMATION SYSTEMS: LECTURE 17 STUDY GUIDE

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 24

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

25 Terms

1

cybersecurity threat

  • an event or condition that has the

  • potential for causing asset loss and the undesirable

  • consequences or impact from such loss

  • Assets include: Information, Software, and Hardware

New cards
2

Causes of Asset Loss

situations and events related to adversity

typically referred to as disruptions, hazards, or

threats

New cards
3

Types of Asset Loss

all forms of intentional, unintentional, accidental,

incidental, misuse, abuse, error, weakness, defect,

fault, and/or failure events and associated conditions

New cards
4

Cybersecurity vulnerabilities

  • weaknesses in system security that can be exploited

  • System compromises can lead to:

    • They can lead to breaches, data loss, system outages, and policy violations.

    • Vulnerabilities may stem from flaws in design, implementation, or security exposure in software.

New cards
5

Database of Software Vulnerabilities

  • Attackers exploit vulnerabilities to launch attacks.

  • Organizations maintain public databases of software vulnerabilities.

  • These databases help others prevent known security threats.

New cards
6

Cybersecurity Exploits

  • a method hackers use to exploit system vulnerabilities.

  • It includes code, commands, or exploit kits targeting security flaws.

  • enable unauthorized remote access and privilege to move deeper into the organization’s network.

New cards
7

Cybersecurity threat mitigation

includes the policies and procedures to help prevent against security incidents

New cards
8

Three Main Components of Threat Mitigation

  • Threat Prevention: Policies and procedures put in place by an organization to protect systems and data

  • Threat Identification: Security tools and oversight designed to identify specific and active security threats

  • Threat Cure: Policies, tools, and strategies used to lessen the impact of active security threats

New cards
9

Common Types of Cybersecurity Breaches

  • Viruses

  • Social Engineering

  • Spyware

  • Distributed Denial of Service (DDOS)

  • Adware

  • Malware Bots

  • Ransomeware

  • Keyloggers

New cards
10

Viruses:

  • Application: Software that infects computers, are created using code and typically must be “run” to cause harm.

  • Adverse Impact: They can damage programs or disrupt computer and network operations.

  • Key Condition: Like biological viruses, they replicate and spread but require a host file or document.

New cards
11

Social Engineering

  • manipulates people into revealing confidential information.

  • Targets include bank details, passwords, network access, and Social Security numbers.

  • These attacks exploit trust and lack of awareness about sensitive information

New cards
12

Common Social Engineering Cybersecurity Attacks

  • E-mail messages

  • Baiting Scenarios

New cards
13

Spyware

  • collects data on internet activity and user behavior.

  • It can capture keystrokes, passwords, account numbers, and confidential information.

  • Often installed through free downloads or malicious websites

New cards
14

Distributed Denial of Service (DDOS) attack

  • A cyberattack to make a computer or online service unavailable to its users.

  • It’s usually accomplished by flooding the resource with nonsensical or superfluous requests from multiple sources across the web.

New cards
15

Adware

  • collects users' web browsing history.

  • It displays ads on digital devices.

  • It forwards search history to advertisers and social media sites.

  • It gathers marketing and behavioral data.

New cards
16

Malware bots

Uses self-propagating malware that infects its host and connects back to a central server

New cards
17

Ransomware

  • malware that locks data until a ransom is paid.

  • It encrypts files and demands payment for decryption.

  • Payments are often made via untraceable methods like Bitcoin.

  • Attackers may or may not provide a decryption key after payment.

  • Some variants threaten to expose personal data if the ransom is unpaid.

New cards
18

Keyloggers

  • Keyloggers (or system monitors) record keystrokes on a device.

  • They can be used on smartphones, tablets, and computers.

  • Keyloggers exist as hardware devices or software applications.

  • Software keyloggers are often Trojan horses installed without user awareness.

  • They can capture passwords and confidential data.

New cards
19

Chief Information Security Officer (CISO)

  • Develops policies to protect an organization’s information assets.

  • Advises on minimizing IT risks and implementing security processes.

  • Manages security incidents, tools, and protocol enforcement.

  • Typically requires a master's degree (MBA or cybersecurity)

New cards
20

Common Job Responsibilities of a CISO

  • Aligns security strategies with business goals.

  • Reports on information security risks to ensure compliance.

  • Manages security incidents to protect IT assets.

  • Oversees vendor relationships to ensure security requirements are met

New cards
21

Cybersecurity Goals

  • is to protect systems, data, and information from theft, compromise, or attack.

  • Three common cybersecurity goals:

    • Protect data, information, and systems.

    • Preserve data, information, and system integrity.

    • Promote authentication to ensure authorized access and prevent unauthorized access.

New cards
22

Integrity

  • can be maintained through measures like:

    • User-access controls

    • File permissions

    • Version controls

  • Organizations must have systems to detect changes in data caused by both human and nonhuman events.

New cards
23

Authentication

  • the process of verifying the origin of information or determining an individual's or entity's identity.

  • Authentication methods aim to:

    • Prevent unauthorized access to resources.

    • Ensure authorized users have the access they need.

New cards
24

Identity Verification

used to defend IT systems and infrastructure from unauthorized access.

New cards
25

Common methods of identity verification include

  • Two-Factor Identification (2FA)

  • Knowledge-Based Authentication (KBA)

  • Multi-Factor Authentication (MFA)

  • Biometric Verification

  • Token-Based Authentication

New cards

Explore top notes

note Note
studied byStudied by 1 person
808 days ago
5.0(1)
note Note
studied byStudied by 16 people
847 days ago
5.0(1)
note Note
studied byStudied by 30 people
704 days ago
5.0(1)
note Note
studied byStudied by 54 people
185 days ago
5.0(1)
note Note
studied byStudied by 181 people
919 days ago
5.0(2)
note Note
studied byStudied by 35 people
243 days ago
5.0(1)
note Note
studied byStudied by 3 people
51 days ago
5.0(1)
note Note
studied byStudied by 21 people
612 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (59)
studied byStudied by 3 people
147 days ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 10 people
549 days ago
5.0(1)
flashcards Flashcard (415)
studied byStudied by 6 people
631 days ago
4.0(2)
flashcards Flashcard (30)
studied byStudied by 5 people
701 days ago
5.0(1)
flashcards Flashcard (104)
studied byStudied by 117 people
371 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 29 people
423 days ago
5.0(2)
flashcards Flashcard (57)
studied byStudied by 17 people
707 days ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 35 people
12 minutes ago
5.0(1)
robot