Accounting Information Systems - Chapter 16

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Encompasses the measures a company takes to protect a computer or system—including those on the internet—against unauthorized access or attacks

Cybersecurity

2
New cards

Whose responsibility is it to ensure that their company adopts a proactive cybersecurity plan

1. Management

2. Executives

3
New cards

A type of cyberattack that takes a system hostage until a ransom is paid

Ransomware

4
New cards

What are some examples of recent cybersecurity threats

1. Colonial Pipeline

2. Florida Water Supply

3. Equifax

5
New cards

Attacked with ransomware and caused economic disruption

Colonial Pipeline

6
New cards

A hacker accessed the water treatment levels in the system, and increased the sodium hydroxide levels to fatal amounts

Florida Water Supply

7
New cards

Names, Social Security numbers, birth dates, addresses, and even driver's license information were stolen during a data breach

Equifax

8
New cards

A U.S. Department of Commerce agency that promotes innovation in science, standards, and technology to improve the quality of life in the United States

National Institute of Standards and Technology (NIST)

9
New cards

What are the 5 functions in NIST's Cybersecurity Framework that companies should adopt to address cybersecurity risks? (In Order)

1. Recover

2. Identify

3. Protect

4. Detect

5. Respond

10
New cards

How many control families does NIST have?

18

11
New cards

What are the top 4 NIST control families that have the most number of related internal controls? (In Order)

1. Systems and Communications Protection (SC) - 44

2. Access Control (AC) - 25

3. System and Services Acquisition (SA) - 22

4. Physical and Environmental Protection (PE) - 20

12
New cards

The life cycle of a cyberattack from early stages of information gathering through final steps of damaging the network

Cyber-Kill Chain

13
New cards

What are the three steps in the cyber-kill chain?

1. Gathering information about the network - (Plan)

2. Accessing the network - (Enter)

3. Disrupting, damaging, or destroying the network - (Damage)

14
New cards

Finding vulnerabilities in the network and gaining information about its contents (Plan)

Reconnaissance Attacks

15
New cards

Accessing the network and its contents (Enter)

Access Attacks

16
New cards

Causing damage to, disrupting the services of, or destroying the network and its contents (Damage)

Disruptive Attacks

17
New cards

What are the 2 categories of cyberattacks

1. Physical Attacks

2. Logical Attacks

18
New cards

Attackers threaten elements a network administrator has no control over, such as physical security, hardware, and people

Physical Attacks

19
New cards

Attacks occur on a fully digital spectrum and require no human interaction other than the attacker instigating the attack.

Logical Attacks

20
New cards

Uses human interaction—on the part of the target, the attacker, or both—to generate information about the network

Physical Reconnaissance Attack

21
New cards

- Involves persuading people to perform acts that would give the hackers access to confidential information, such as birth dates, passwords, and user IDs

- One of the most robust categories of cyberattacks

- Always Physical Attacks

Social Engineering (Phishing)

22
New cards

A deceptive request designed to trick victims into sharing private information

Email Phishing

23
New cards

Sending text messages

Mobile Phishing

24
New cards

Leaving voicemails with urgency to provide info before something bad happens

Voice Phishing

25
New cards

Looking through someone else's physical trash

Dumpster Diving

26
New cards

- The unauthorized interception of communication

- Listening to phone calls

- Intercepting emails, text messages, and other forms of communication

Eavesdropping (Sniffing)

27
New cards

How do businesses mitigate the risk of attackers gaining information by intercepting communications?

1. Encrypt data

2. Use secure communication lines

28
New cards

A standard network protocol that allows users to transfer files between the company network and outside parties (Securely Send Files)

File Transfer Protocol (FTP)

29
New cards

- Uses digital attacks and does not require a human target

- Target is a network vulnerability

Logical Reconnaissance Attack

30
New cards

Used to identify which hosts are active in the network by sending a communication to each IP address to see if there is a response packet, which is a small portion of the full message being sent over the network

Ping Sweep (IP Probe)

31
New cards

The next step is for hackers to narrow their results using ______, which indicate which ports are open and sending or receiving data on the network

Port Scans

32
New cards

NIST recommends that companies perform ______ to detect and classify security loopholes in their infrastructure

Vulnerability Scans

33
New cards

Companies commonly perform _____ by attempting to hack their own systems

Penetration Testing (Pen Testing)

34
New cards

A company should ensure that systems are running up-to-date security by applying ______ as soon as they are available

Patches

35
New cards

- Result in access to either hardware or people

- That access can be gained with the assistance of an unknowing victim or through force

Physical Access Attacks

36
New cards

Is the physical act of gaining unauthorized entry by closely following someone else through a physical security checkpoint and using that person's credentials to gain access

Tailgating (Piggybacking)

37
New cards

What are the 2 types of tailgating?

1. Accidental Tailgating

2. Polite Tailgating

38
New cards

Seek unauthorized access to a system or an application by either exploiting a network vulnerability unveiled during reconnaissance attacks or attempting to use force to get through network security

Logical Access Attacks

39
New cards

Attackers force access to the network by attempting many passwords or phrases until finding the correct one

Brute-Force Attack

40
New cards

Using lists of commonly used words and combinations of words and letters to guess passwords

Dictionary Attacks

41
New cards

Attempt to gain access to an ongoing communication between two endpoints by pretending to be each of the parties

On-Path Attacks

42
New cards

An attacker creates IP packets with modified source addresses to disguise their identity and impersonate a legitimate computer on the network

IP Spoofing

43
New cards

What is the primary way devices on the network communicate?

Sending and receiving IP packets

44
New cards

The source address is the IP address of the packet sender

Normal Packets

45
New cards

A packet that has a forged source (IP) address

Spoofed Packets

46
New cards

- Prohibit users from using resources such as computers, websites, servers, or an entire network

- Attackers continuously send fake requests to the business to consume the system's capacity, resulting in loss of availability for "real" users

- Brute-force attack is the most common

Denial-of-Service (DoS) Attacks

47
New cards

- Computers that are programmed to do whatever attackers want, such as flooding a specific host with repetitive requests to consume the target system's capacity

- These computers are infected with malware

Botnets

48
New cards

A cyber attacker who wants to perform a large-scale DoS attack can carry out a ______ that uses multiple machines or IP addresses to force the target to shut down

Distributed Denial-of-Service (DDoS) Attack

49
New cards

What are the 2 reasons that Distributed Denial-of-Service (DDoS) Attacks are difficult to stop

1. The hacker uses multiple originating points of attack so the company has to identify each source

2. Difficult for a company to differentiate between an attack and legitimate business traffic

50
New cards

Software specifically designed to damage, disrupt, or gain unauthorized access to systems

Malware

51
New cards

Written to cause harm and attack the target system

Malicious Code

52
New cards

What are the 4 types of malware

1. Virus

2. Worms

3. Logic Bomb

4. Trojan Horse

53
New cards

A type of malware that replicates itself in a system through user interaction and spreads quickly, causing damage to core system functions

Virus

54
New cards

Replicate without the assistance of human interaction

Worms

55
New cards

A piece of malicious code that is programmed into a system and remains dormant until certain conditions are met

Logic Bomb

56
New cards

- Disguised as benign software but carries malicious code that may be activated via a logic bomb

- Nonreplicating

- Used to obtain back door access to a target system

Trojan Horse