Networks, IoT, and Cybersecurity in Management Information Systems

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/73

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

74 Terms

1
New cards

Modem

A device that modulates/demodulates signal for transportation.

2
New cards

Modulation and Coding

Techniques used by modem to adapt the signal to the media.

3
New cards

Signal

Binary information we want to send.

4
New cards

Signal Frequency Spectrum

All the frequency components of a signal.

5
New cards

Bandwidth

Maximum bits per second that can be transmitted. This is how network speed/capacity is measured.

6
New cards

Circuit Switching

Older technology that originated with telephone calls; inefficient for digital transmission.

7
New cards

Packet Switching

Transfers data or voice; files are broken into packets, numbered sequentially, routed individually to their destinations, and reassembled at the destination.

8
New cards

Internet Protocol (IP)

The basic technology that makes global communication possible; each device attached to a network has a unique IP address that enables it to send and receive files made up of packets.

9
New cards

Intranet

Used within a company for data access, sharing, and collaboration.

<p>Used within a company for data access, sharing, and collaboration.</p>
10
New cards

Extranet

Private, company-owned networks that can be logged into remotely via the Internet.

11
New cards

Virtual Private Network (VPN)

Used where security of transmissions is a concern, because they encrypt the packets before they are transferred over the network.

12
New cards

Quality of Service (QoS)

A measure of the overall performance of a network, particularly the performance seen by the users of the network.

<p>A measure of the overall performance of a network, particularly the performance seen by the users of the network.</p>
13
New cards

Latency-sensitivity

Data such as real-time voice and high-quality video.

14
New cards

Prioritized Traffic

Data and apps that are time-delay-sensitive or latency-sensitive apps.

15
New cards

Throttle Traffic

Gives latency-sensitive apps priority; other types of traffic need to be held back (throttled).

16
New cards

Traffic Shaping

The ability to prioritize and throttle network traffic.

17
New cards

Bluetooth

Short-range wireless communication technology allowing device pairing.

<p>Short-range wireless communication technology allowing device pairing.</p>
18
New cards

Wi-Fi

Standard way to wirelessly connect computing devices through routers commonly connected to the Internet.

19
New cards

Cellular Data Networks

The 3G, LTE, 4G, and 5G cellular data networks that we use on mobile devices today.

20
New cards

Near-Field Communication (NFC)

Enables two devices within close proximity to establish a communication channel and transfer data using radio waves; more secure than other wireless technologies.

21
New cards

Examples of NFC

Apple watch, digital tickets providing access to concerts, transmit public transport payment through phones.

<p>Apple watch, digital tickets providing access to concerts, transmit public transport payment through phones.</p>
22
New cards

Internet of Things (IoT)

The network of physical objects embedded with electronics, software, sensors, and network connectivity that enables data collection and exchange.

23
New cards

Cyberthreat

A threat posed by means of the Internet and the potential source of malicious attempts to damage or disrupt a computer network, system, or application.

<p>A threat posed by means of the Internet and the potential source of malicious attempts to damage or disrupt a computer network, system, or application.</p>
24
New cards

Vulnerability

A gap in IT security defenses of a network, system, or application that can be exploited by a threat.

25
New cards

Incident

An attempted or successful unauthorized access to a network, system, or application; unwanted disruption or denial of service.

26
New cards

Data Breach

The successful retrieval of sensitive information by an individual, group, or software system.

27
New cards

Unintentional Cyberthreats

Cyberthreats caused by human error, poorly designed systems, faulty programming, and environmental hazards.

28
New cards

Intentional Cyberthreats

Cyberthreats that are deliberately caused, including hacking, phishing, and crimeware.

<p>Cyberthreats that are deliberately caused, including hacking, phishing, and crimeware.</p>
29
New cards

Hacking

Intentionally accessing a computer without authorization or exceeding authorized access.

30
New cards

White Hat

A computer security specialist who breaks into protected systems to test and assess their security.

31
New cards

Black Hat

A person who attempts to find computer security vulnerabilities and exploit them for personal or financial gain.

32
New cards

Gray Hat

A person who may violate ethical standards but without malicious intent.

33
New cards

Hacktivist

is short for hacker-activist, or someone who performs hacking to promote awareness, or otherwise support a social, political, economic, or other cause.

34
New cards

Malware

refers to hostile or intrusive software, including computer viruses, rootkits, worms, Trojan horses, ransomware, and other malicious programs used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems.

35
New cards

Spyware

is tracking software that is not designed to intentionally damage or disable a system but to monitor or track activities.

36
New cards

Adware

is software that embeds advertisement in the application.

37
New cards

Ransomware

is a type of malware that is designed to block access to a computer system until a sum of money has been paid.

38
New cards

Botnet

is a group of external attacking entities and is a totally different attack method/vector from malware, which is internal to the system.

39
New cards

Zombies

are a group of infected computers that can be controlled and organized into a network on the command of a remote botmaster (also called a bot herder).

40
New cards

Distributed Denial-of-Service (DDoS)

crashes a network or website by bombarding it with traffic (i.e., requests for service) and effectively denies service to all those legitimately using it.

41
New cards

Telephony Denial-of-Service (TDOS)

floods a network with phone calls and keeps the calls up for long durations to overwhelm an agent or circuit and prevent legitimate callers from using network resources.

42
New cards

Permanent Denial-of-Service (PDOS)

prevents the target's system or device from working, aiming to completely prevent the target's device(s) from functioning.

43
New cards

Data tampering

is a common means of internal attack, referring to an attack during which someone enters false or fraudulent data into a computer, or changes/deletes existing data.

44
New cards

Insider and Privilege Misuse

is a form of intentional cyberthreats that involves employees misusing their access privileges.

45
New cards

Physical Theft

is a form of intentional cyberthreat involving the physical stealing of devices or data.

46
New cards

Phishing

is a form of intentional cyberthreat that involves tricking individuals into providing sensitive information.

47
New cards

Crimeware

is a term that encompasses various forms of malware used for criminal activities.

48
New cards

Internal Threats

Threats from employees that can be some of the most challenging to defend against.

49
New cards

Advanced Persistent Threats (APT)

Launched by attackers through phishing to gain access to an enterprise's network, designed for long-term espionage.

<p>Launched by attackers through phishing to gain access to an enterprise's network, designed for long-term espionage.</p>
50
New cards

Hackers and Hacktivists

Individuals or groups who carry out high-profile attacks to further their personal agendas.

51
New cards

Social Engineering

All techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons.

52
New cards

Bring Your Own Device (BYOD)

Employees providing their own (mobile) devices for business purposes to reduce expenses through cut purchase and maintenance costs.

53
New cards

BYOD Usage Rate

Roughly 74% of U.S. organizations are using or planning to use BYOD.

54
New cards

BYOD Cost Benefit

Cuts business costs by not having to purchase and maintain employees' mobile devices.

55
New cards

BYOD Security Risks

Mobile devices rarely have strong authentication, access controls, and encryption even though they connect to mission-critical data and cloud services.

56
New cards

Social Media Vulnerabilities

Social networks and cloud computing increase vulnerabilities by providing a single point of failure and attack for organized criminal networks.

57
New cards

Social Media-related Events

FBI reports that social media-related events have quadrupled over the past five years.

58
New cards

Business continuity

Maintaining business functions or restoring them quickly when there is a major disruption.

59
New cards

Business continuity plan

Covers business processes, assets, human resources, and business partners to keep the business running after a disaster occurs.

<p>Covers business processes, assets, human resources, and business partners to keep the business running after a disaster occurs.</p>
60
New cards

Types of disasters covered by business continuity planning

Includes fires, earthquakes, floods, power outages, malicious attacks, and other types of disasters.

61
New cards

Risk (in cyber risk management)

Quantified as the probability of a threat successfully exploiting a vulnerability multiplied by the estimated cost of the loss or damage.

<p>Quantified as the probability of a threat successfully exploiting a vulnerability multiplied by the estimated cost of the loss or damage.</p>
62
New cards

Probable Maximum Loss (PML)

A calculation executed to determine the cost of security, defined as Probability x total cost of harm.

63
New cards

Factors leading to increased risk of cyberattack

Includes interconnected, interdependent, wirelessly networked business environment; smaller, faster, cheaper computers and storage devices; decreasing skills necessary to be a computer hacker; and international organized crime taking over cybercrime.

64
New cards

Intrusion Detection Systems (IDSs)

Scans for unusual or suspicious traffic as a passive defense.

<p>Scans for unusual or suspicious traffic as a passive defense.</p>
65
New cards

Intrusion Prevention Systems (IPSS)

Designed to take immediate action, such as blocking specific IP addresses, whenever a traffic-flow anomaly is detected as an active defense.

<p>Designed to take immediate action, such as blocking specific IP addresses, whenever a traffic-flow anomaly is detected as an active defense.</p>
66
New cards

Antivirus Software

Designed to detect malicious codes and prevent users from downloading them.

67
New cards

Blockchain

A system comprised of transactions, immutable ledgers, decentralized peers, encryption processes, consensus mechanisms, and optional smart contracts.

68
New cards

Distributed ledger

Represented by a sequential chain of data blocks that records transactions, establishes identity of the user, and establishes contracts.

<p>Represented by a sequential chain of data blocks that records transactions, establishes identity of the user, and establishes contracts.</p>
69
New cards

Decentralized peers

In a blockchain, each NODE has a copy of the ledger, contrasting with a centralized 'Hub and Spoke' type of network.

70
New cards

Consensus in blockchain

Ensures that the next block in a blockchain is the one and only version of the truth and keeps powerful adversaries from derailing the system.

71
New cards

Proof of Work (POW)

A consensus mechanism where the miner gets block rewards based on the amount of work they have done.

72
New cards

Proof of Stake (POS)

A consensus mechanism where a new block creator is selected based on the number of coins they hold, and miners only take transaction fees.

73
New cards

Mining pools

Groups of miners that work together to increase efficiency.

74
New cards

Cost-effectiveness of POS

POS is decentralized and very cost-effective.