Essentials of Management Information Systems - Chapter 8: Securing Information Systems

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

Flashcards for key terms and concepts from Chapter 8 of Essentials of Management Information Systems regarding securing information systems.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

Security

Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

2
New cards

Controls

Methods, policies, and organizational procedures that ensure safety of organization’s assets, accuracy, and reliability of its accounting records, and operational adherence to management standards.

3
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

4
New cards

Trojan horse

Software that appears benign but performs harmful actions; does not replicate itself but serves as a shell for viruses.

5
New cards

Hacker

An individual intending to gain unauthorized access to a computer system.

6
New cards

Cracker

A hacker with criminal intent.

7
New cards

Botnet

Networks of 'zombie' PCs infiltrated by bot malware.

8
New cards

Denial-of-service attack (DoS)

An attack that floods a server with false requests, leading to network crashes.

9
New cards

Phishing

Setting up fake websites or sending emails that appear legitimate to trick users into revealing confidential personal data.

10
New cards

Two-factor authentication

A method of confirming a user's claimed identity by utilizing a combination of two different components.

11
New cards

Encryption

Transforming text or data into cipher text to prevent unauthorized access.

12
New cards

Public key encryption

A method that uses two mathematically related keys: a public key for encryption and a private key for decryption.

13
New cards

Identity management

Business processes and technologies for identifying valid users of a system.

14
New cards

Eavesdropping program

A sniffer that monitors information traveling over a network to steal proprietary information.

15
New cards

Ransomware

Malware that encrypts a victim's files and demands payment for the decryption key.

16
New cards

SQL injection attack

A code injection technique that exploits vulnerabilities in a web application's software by placing malicious SQL code in a query.

17
New cards

Social engineering

The manipulation of people into performing actions or divulging confidential information.