DSS Final: Internet, Security & Ethics

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards

Internetwork

Interconnected networks

Routes & firewalls

2
New cards

The Internet

Network of Networks

(No one governs or owns it)

3
New cards

ARPANET

Advanced Research Projects Agency Network

(Nuclear war myth) first operational packet-switching network and a precursor to the modern Internet.

4
New cards

NSF

National Science Foundation

AUP dropped, commercial traffic allowed

5
New cards

TCP/IP

Transmission Control Protocol/Internet Protocol

IPv4 addresses

A set of standardized rules that allow computers to communicate over a network.

6
New cards

Browsers

software applications used to access, retrieve, and display content from the World Wide Web.

Led to Mosaic & Netscape

(Google Chrome, Firefox, Safari)

7
New cards

HTML & HTTP

Hypertext Markup Language and Hypertext Transfer Protocol

Tags, webpages

8
New cards

URL

Uniform Resource Locator. The unique address of any Web document. (.com, .net, .edu, .org)

9
New cards

DNS

Domain Name System, Universal address translator. "phonebook" of the internet, translating human-readable domain names into IP addresses

10
New cards

website

a collection of related webpages

11
New cards

Search Engine

A database; Organized, Queries, and Spiders/bot

12
New cards

cloud computing

Computing services over Networks

Service virtualization

13
New cards

ASP to XaaS

Saas, IaaS, PaaS, HaaS

he evolution from Application Service Providers (ASPs) to "Everything as a Service" (XaaS)

14
New cards

Web Services & SOA

-Software "objects"

-Build applications

-Scalable (extensible)

-Service-Oriented Architecture

15
New cards

IoT

(Internet of Things) refers to a network of physical objects of things that are embedded with electronics, sensors, software, and network creativity. These physical objects can exchange data with each other

16
New cards

Cookies

Unexecutable text files,

Deposited by servers

Tracks user

Maintains "state" with server

17
New cards

Spyware

designed to secretly monitor and collect information about a user or organization with/without their knowledge or consent

Emails, settings, clickstreams

Relays to 3rd party

18
New cards

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

19
New cards

Ransomware

Hijacks data/files for payment

Sometimes a scam

20
New cards

zero-day vulnerability

a security flaw in software or hardware that is unknown to the software vendor or developer and has not yet been patched

21
New cards

Multi-factor authentication

a security process that requires users to provide two or more independent credentials

(Knowledge, Inherent, & Possession)

22
New cards

Knowledge

Something you know

Password, PIN, secret question

23
New cards

Inherent

something you are

Fingerprint, Voice recognition, biometrics

24
New cards

Possession

something you have

Fob, code, QR code, confirmation

25
New cards

Public Key Infrastructure (PKI)

the system for issuing pairs of public and private keys and corresponding digital certificates

Encryption

Symmetric

Asymmetric

Digital signatures

26
New cards

Blockchain

Distributed database

Block = transaction/document/file/contract

27
New cards

Social Engineering

manipulation where attackers trick people into giving up confidential information, access credentials, or performing actions

28
New cards

Golden Rule

Do unto others as you would have them do unto you

29
New cards

Kant's Categorical Imperative

"What kind of world would it be if everyone behaved this way?"

30
New cards

Slippery Slope

A step closer to something undesirable

31
New cards

Utilitarianism

The good of the many

32
New cards

Risk Aversion

Reduce risk/cost

33
New cards

No free Lunch

Assume ownership

34
New cards

Securing Business Practices

- governance, risk and compliance (GRC)

- corporate governance

- IT governance

35
New cards

Governance

[S]tructures and processes... for accountability,transparency, rule of law, [and] stability

36
New cards

Corporate Governance

Policies, regulations, laws to ensure company is run properly

37
New cards

IT Governance

Accountability in IT development & use

38
New cards

Risk

Probability of an unwanted event

39
New cards

Controls

Policies and procedures to mitigate risk or reduce damage (prevent or detect)

40
New cards

Audit

Evaluation of evidence regarding integrityand reliability of a system

41
New cards

Compliance

State of accordance with a set of specifications or legislation

SOX, FIP, COPPA, FERPA, HIPAA, Basel, & GDRP

42
New cards

IT (accounting or systems) Audit

Risk-focused

Promote sound control

Ensure timely resolution of deficiencies

Inform stakeholders of risk-management practices effectiveness