1/16
Flashcards for key terms and concepts from Chapter 8 of Essentials of Management Information Systems regarding securing information systems.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Security
Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
Controls
Methods, policies, and organizational procedures that ensure safety of organization’s assets, accuracy, and reliability of its accounting records, and operational adherence to management standards.
Malware
Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
Trojan horse
Software that appears benign but performs harmful actions; does not replicate itself but serves as a shell for viruses.
Hacker
An individual intending to gain unauthorized access to a computer system.
Cracker
A hacker with criminal intent.
Botnet
Networks of 'zombie' PCs infiltrated by bot malware.
Denial-of-service attack (DoS)
An attack that floods a server with false requests, leading to network crashes.
Phishing
Setting up fake websites or sending emails that appear legitimate to trick users into revealing confidential personal data.
Two-factor authentication
A method of confirming a user's claimed identity by utilizing a combination of two different components.
Encryption
Transforming text or data into cipher text to prevent unauthorized access.
Public key encryption
A method that uses two mathematically related keys: a public key for encryption and a private key for decryption.
Identity management
Business processes and technologies for identifying valid users of a system.
Eavesdropping program
A sniffer that monitors information traveling over a network to steal proprietary information.
Ransomware
Malware that encrypts a victim's files and demands payment for the decryption key.
SQL injection attack
A code injection technique that exploits vulnerabilities in a web application's software by placing malicious SQL code in a query.
Social engineering
The manipulation of people into performing actions or divulging confidential information.