Chapter 8 - Securing Information Systems

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/63

flashcard set

Earn XP

Description and Tags

made to slide 35

Last updated 7:39 PM on 3/31/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

64 Terms

1
New cards

What is Security?

Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems

2
New cards

What is Controls?

Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards

3
New cards

What is Internet Vulerabilities?

Network open to anyone, size means abuses can have wide impact; corporate networks linked to Internet more vulnerable; E-mail, IM, and P2P increase vulnerability

4
New cards

How can Email open you to internet vulnerabilities?

attachments with malicious software; can be used to transmit trade secrets, confidential data

5
New cards

How can IM open you to internet vulnerabilities?

back door into a secure network

6
New cards

How can P2P open you to internet vulnerabilities?

can transmit malicious software, expose corporate data

7
New cards

What does “malware” stand for?

Malicious software designed to damage, disrupt, or gain unauthorized access to systems

8
New cards

What is a computer virus?

A type of malware that attaches to a host file/program and spreads when the host is executed

9
New cards

How do viruses typically spread?

Through infected files, downloads, email attachments, and removable media

10
New cards

What is a worm?

Self‑replicating malware that spreads across networks without needing a host file

11
New cards

Key difference between a virus and a worm?

Viruses require a host file; worms spread independently

12
New cards

What is a “drive‑by download”?

Malware installed automatically when a user visits a compromised website

13
New cards

How do downloads spread malware?

Users install infected software or files, often unknowingly

14
New cards

Why are email attachments a common malware vector?

Users often trust familiar senders and open attachments without verifying authenticity

15
New cards

What makes mobile devices vulnerable to malware?

App store sideloading, insecure Wi‑Fi, outdated OS versions, and social engineering

16
New cards

How does malware spread on social networks?

Through malicious links, fake profiles, compromised accounts, and clickbait posts

17
New cards

How are Employees Internal Threats?

Security threats often originate inside an organization; inside knowledge; sloppy security procedures; social engineering; both end users and information systems specialists are sources of risk

18
New cards

What causes software vulnerabilities in commercial software?

Bugs and flaws in program code; zero‑defect software is impossible, so defects can create openings for attackers

19
New cards

What is a zero‑day vulnerability?

A software flaw unknown to the vendor, exploited by attackers before a patch is available

20
New cards

How are software vulnerabilities addressed?

Through patches and patch management; however, even hardware (e.g., microprocessors) can have vulnerabilities like Spectre and Meltdown

21
New cards

What are HIPAA?

Medical security and privacy rules and procedures

22
New cards

What is the Gramm-Leach-Bliley Act?

Requires financial institutions to ensure the security and confidentiality of customer data

23
New cards

What is the Sarbanes-Oxley Act?

Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally

24
New cards

What is Electronic evidence?

Evidence for white collar crimes often in digital form; proper control of data can save time and money when responding to legal discovery request

25
New cards

What is Computer forensics?

Scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in court of law; recovery of ambient data

26
New cards

What are general controls in Information Systems Controls?

Govern design, security, and use of computer programs and security of data files in general throughout organization

27
New cards

What are application controls in Information Systems Controls?

Controls unique to each computerized application; Input controls, processing controls, output controls

28
New cards

What is Risk Assessment?

Determines the level of risk to firm if specific activity or process is not properly controlled

29
New cards
<p>What does this image represent?</p>

What does this image represent?

Online Order Processing Risk Assessment

30
New cards

What is Security Policy?

Ranks information risks, identifies security goals and mechanisms for achieving these goals; drives other policies

31
New cards
<p>What does this image represent?</p>

What does this image represent?

Access Rules for a Personnel System

32
New cards

What is Disaster recovery planning?

Devises plans for restoration of disrupted services

33
New cards

What is Business continuity planning?

Focuses on restoring business operations after disaster

34
New cards

What do both disaster recovery and business continuity planning need to do?

Need to identify firm’s most critical systems - business impact analysis to determine impact of an outage; management must determine which systems restored first

35
New cards

What are information systems audits?

Examines firm’s overall security environment as well as controls governing individual information systems

36
New cards

What are security audits?

Review technologies, procedures, documentation, training, and personnel; may even simulate disaster to test responses

37
New cards
<p>What does this image represent?</p>

What does this image represent?

Sample Auditor’s List of Control Weaknesses

38
New cards

What are some examples of Tools and Technologies for Safeguarding Information Systems?

Identity management software; Authentication; Firewall; Intrusion detection system; antimalware and antispyware software; unified threat management (UTM) systems

39
New cards

What is Identity management software?

Automates keeping track of all users and privileges; Authenticates users, protecting identities, controlling access

40
New cards

What is authentication?

Password systems; Tokens; Smart cards; Biometric authentication; TFA

41
New cards

What is a firewall?

Combination of hardware and software that prevents unauthorized users from accessing private networks

42
New cards

What is packet filtering?

Packet filtering is a network security technique used by routers and firewalls to control traffic by examining packet header information (source/destination IP, ports, protocol, direction) and allowing or blocking packets based on predefined rules

43
New cards

What is an intrusion detection system?

Monitors hot spots on corporate networks to detect and deter intruders

44
New cards

What is antimalware and antispyware software?

Checks computers for presence of malware and can often eliminate it as well; requires continual updating

45
New cards
46
New cards
47
New cards
48
New cards
49
New cards
50
New cards
51
New cards
52
New cards
53
New cards
54
New cards
55
New cards
56
New cards
57
New cards
58
New cards
59
New cards
60
New cards
61
New cards
62
New cards
63
New cards
64
New cards

Explore top notes

note
Physiologie cardiaque
Updated 705d ago
0.0(0)
note
History Mini Unit
Updated 342d ago
0.0(0)
note
Digestive System
Updated 1113d ago
0.0(0)
note
Unit 4: Financial Sector
Updated 1089d ago
0.0(0)
note
the heart
Updated 1062d ago
0.0(0)
note
The Renaissance
Updated 578d ago
0.0(0)
note
Physiologie cardiaque
Updated 705d ago
0.0(0)
note
History Mini Unit
Updated 342d ago
0.0(0)
note
Digestive System
Updated 1113d ago
0.0(0)
note
Unit 4: Financial Sector
Updated 1089d ago
0.0(0)
note
the heart
Updated 1062d ago
0.0(0)
note
The Renaissance
Updated 578d ago
0.0(0)

Explore top flashcards

flashcards
bio ch 54
66
Updated 1259d ago
0.0(0)
flashcards
Chapter 44 - Industry
298
Updated 1106d ago
0.0(0)
flashcards
Marketing Exam 2
50
Updated 883d ago
0.0(0)
flashcards
Enska kafli 3
62
Updated 1157d ago
0.0(0)
flashcards
BIOL LABORATORY EQUIPMENTS
41
Updated 1105d ago
0.0(0)
flashcards
US History Midterm Review
49
Updated 1173d ago
0.0(0)
flashcards
144 MedTerm #2
39
Updated 775d ago
0.0(0)
flashcards
1.2 Obj 2 & 3
32
Updated 574d ago
0.0(0)
flashcards
bio ch 54
66
Updated 1259d ago
0.0(0)
flashcards
Chapter 44 - Industry
298
Updated 1106d ago
0.0(0)
flashcards
Marketing Exam 2
50
Updated 883d ago
0.0(0)
flashcards
Enska kafli 3
62
Updated 1157d ago
0.0(0)
flashcards
BIOL LABORATORY EQUIPMENTS
41
Updated 1105d ago
0.0(0)
flashcards
US History Midterm Review
49
Updated 1173d ago
0.0(0)
flashcards
144 MedTerm #2
39
Updated 775d ago
0.0(0)
flashcards
1.2 Obj 2 & 3
32
Updated 574d ago
0.0(0)