stupidass class itm100 full final exam

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/258

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

259 Terms

1
New cards

Organizations address security risks through two lines of defense; the first is ______ and the second is ______.

people

technology

2
New cards

Mixed Reality (MR) - Combines elements of both ___ and , allowing users to interact with_______ while maintaining awareness and interaction with the _____

integrates virtual content into the user’s environment in a way that appears anchored or integrated with the physical surroundings

VR,AR

virtual objects

real world

3
New cards

Value creation - Refers to _____ the worth, utility, or desirability of a product, service, or business entity

increasing

4
New cards

Secure sockets layer (SSL) - A standard security technology for establishing an _____ ____ between a ___ ____ and a ___, ensuring that all data passed between them remain __.

encrypted link

web server

browser

private

5
New cards

• Secure hypertext transfer protocol (SHTTP or HTTPS) - A combination of _____ and _____ to

provide ____ and_____ ____ of an Internet server

HTTP

SSL

encryption

secure identification

6
New cards

• RFID reader (RFID interrogator) - A _____ that reads the contents of ____ ____ in the area

ransmitter/receiver___

RFID tags

7
New cards

• Geocache - A GPS technology adventure game that posts the ____ and _____ location for an item on the Internet for users to find

adventure game__

longitude

latitude

8
New cards

• Geocoin - A round——

is —— and ———

coin-sized object,

is uniquely numbered and hidden in geocache

9
New cards

Radio frequency identification (RFID) - 

Uses electronic tags and labels to identify objects wirelessly over short distances

10
New cards

Enterprise mobility management (EMM) - An enterprisewide ____

while enabling ——-

An enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets

11
New cards

• Pervasive computing - The growing trend of ________ to make them______ in a way that _________ the user’s need to interact with computers as computers

The growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user‘s need to interact with computers as computers

12
New cards

Mobile device management (MDM) -

 A security strategy comprised of ….

products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets

13
New cards

Mobile application management (MAM) - 

A security strategy that …..

administers and enforces corporate epolicies for applications on mobile devices

14
New cards

• Fast data - The application of

big data analytics to smaller data sets in near real or real time in order to solve a problem or create business value

15
New cards

• Digital inclusion -

Efforts to reduce the digital divide by providing equal opportunities and access to technology

16
New cards

ERP (Enterprise Resource Planning)

Collects data from different firms functions and stores them in a single data repository. Solves problems with fragmented data

17
New cards

SCM (Supply Chain Management): Manages relationship with ______.

suppliers

18
New cards

____ service: Charges for cloud servicing are based on the amount of resources actually used up

Measured

19
New cards

Program-data dependence

the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data

20
New cards

ESS (____ ___ ____): ____ decisions,

  • supports sniper management,

  • requires judgment and evaluation as there is no agreed upon solution.

  • Digital ____

Executive Support Systems, Non-routine, dashboard

21
New cards

What are the 4 main actors of MIS

1.) suppliers of hardware and software
2.) Business firms
3.) manufacturers and employees
4.) firms environment

22
New cards

What does behavioural approach include ? (PES)

Psychology, economics and sociology

23
New cards

What does Technical approach include ? (MOpC)

Management science, computer science and operations research

24
New cards

___management: Carries out programs and plans (scientists and knowledge worker)

Middle

25
New cards

_____ management: Makes long strategic decisions about products and services

senior

26
New cards

What are the Functions of an information system ? (IPOF)

Input, process, output, feedback

27
New cards

Information ____: Collects, ____, _____, and distributes information

Information _____: The ____ and ____ that a firm needs

systems: processes, stores

technology: hardware , software

28
New cards

What is the order fulfillment process? (steps)

1.) sales-generate and submit order
2.) accounting-check/approve credit
3.) manufacturing and production-Assemble/ship product

29
New cards

Evolution of IT infrastructure

General-purpose mainframe and minicomputer era: 1959 to present.
- 1958: IBM first mainframes introduced.
- 1965: Less expensive DEC minicomputers introduced.

Personal computer era: 1981 to present.
- 1981: Introduction of IBM PC.
- Proliferation in 80s, 90s resulted in growth of personal software.

Client/server era: 1983 to present.
- Desktop clients networked to servers, with processing work split between clients and servers.
- Network may be two-tiered or multitiered (N-tiered).
- Various types of servers (network, application, Web).

Enterprise computing era: 1992 to present
- Move toward integrating disparate networks, applications using Internet standards and enterprise applications.

Cloud and mobile computing: 2000 to present
- Cloud computing: computing power and software applications supplied over the Internet or other network.
- Fastest growing form of computing.

30
New cards

______ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.

Insiders

31
New cards

two forms of unethical scams

dumpster diving: hacker looks through trash to get info

social engineering: hacker uses socials to trick others into revealing info

32
New cards

policies to prevent scams

info security plans: details how organization implements info security polices

info security polices: rules required to maintain info security (changing passwords every 30 days)

33
New cards

Blank______ agents are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

Destructive

34
New cards

the three areas of information security

authentication and authorization

prevention and response

detection

35
New cards

Phishing Blank______ is a masquerading attack that combines spam with spoofing.

expedition

36
New cards

What are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines?

Destructive agents

37
New cards

Authentication and authorization aligns with

People

38
New cards

Prevention and resistance aligns with

Data

39
New cards

Detection and response aligns with

Attacks

40
New cards

Blank______ phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

Spear

41
New cards

What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to “confirm” their account information?

vishing

42
New cards

What is a masquerading attack that combines spam with spoofing?

Phishing expedition

43
New cards

What reroutes requests for legitimate websites to false websites?

Pharming

44
New cards

What uses a zombie farm, often by an organized crime association, to launch a massive phishing attack?

Pharming attack

45
New cards

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?

Zombie

46
New cards

______ reroutes requests for legitimate websites to false websites.

Pharming

47
New cards

Sock puppet marketing

use of false identity to artificially stimulate demand for somehting

48
New cards

astroturfing

form of sock marketing where they stimulate online conversation and positive reviews of something

49
New cards

A pharming __ uses a zombie farm, often by an organized crime association, to launch a massive phishing attack.

attack

50
New cards

A zombie ______ is a group of computers on which a hacker has planted zombie programs.

farm

51
New cards

______ is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

Zombie

52
New cards

____factor authentication requires only a username and password.

single

53
New cards

Which authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)?

two-factor authentication

54
New cards

______ are small electronic devices that change user passwords automatically.

Tokens

55
New cards

____authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

multi-factor

56
New cards

Select three categories of authentication and authorization.: user ____,

Something that is part of the user, such as a fingerprint or voice signature.

Something the user knows, such as a user ID and password.

Something the user has, such as a smart card or token.

57
New cards

What is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?

smart card

58
New cards

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?

Biometrics

59
New cards

A(n) Blank______ is a set of measurable characteristics of a human voice that uniquely identifies an individual.

voiceprint

60
New cards

What occurs when a network intrusion attacker takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications?

privilege escalation

61
New cards

Vertical privilege escalation

occurs when attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data.

62
New cards

A horizontal privilege ecalation

occurs when attackers grant themselves the same access levels they already have but assume the identity of another user.

63
New cards

content filtering

when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.

64
New cards

Time bombs

computer viruses that wait for a specific date before executing their instructions

65
New cards

Encryption

scrambles information into an alternative form that requires a key or password to decrypt.

66
New cards

Cryptography

the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

67
New cards

Personally identifiable information

any data that could potentially identify a specific individual.

68
New cards

Nonsensitive PII

Information transmitted without encryption and includes information collected from public records, phone books, corporate directives, and websites.

69
New cards

Sensitive PII

Information transmitted with encryption and when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.

70
New cards

Public key encryption uses

two keys: a public key that everyone can have and a private key for only the recipient

71
New cards

A certificate authority is a

trusted third party, such as VeriSign, that validates user identities by means of digital certificates.

72
New cards

Digital certificate

a data file that identifies individuals or organizations online and is comparable to a digital signature.

73
New cards

Network ______ analysis gathers an organization's computer network traffic patterns to identify unusual or suspicious operations.

behavior

74
New cards

______ is an organized attempt by a country’s military to disrupt or destroy information and communication systems for another country.

Cyberwar

75
New cards

What is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals?

Cyberterrorism

76
New cards

Network behavior analysis

gathers an organization's computer network traffic patterns to identify unusual or suspicious operations

77
New cards

WHAT BI IS ASSOCIATED WITH:

Primary users include managers, analysts, and operational users.

Business focus is to manage daily operations and integrate BI with operational systems.

Operational BI

78
New cards

WHAT BI IS ASSOCIATED WITH:

Business focus is to achieve long-term organizational goals.

Time frame for analysis is months to years.

Strategic BI

79
New cards

WHAT BI IS ASSOCIATED WITH:

Business focus is to conduct short-term analysis to achieve strategic goals.

Time frame for analysis is day(s) to weeks to months.

Tactical BI

80
New cards

Affinity grouping analysis reveals the.

relationship between variables along with the nature and frequency of the relationships

81
New cards

…. BI Helps with planning and results in marketing campaign

Strategic BI

82
New cards

… BI Helps with daily analysis and results in refined campaign

Tactical BI

83
New cards

…. BI Helps with immediate actions and results in sales revenue

Operational BI

84
New cards

What is the time duration to make data ready for analysis (i.e., the time for extracting, transforming, and cleansing the data) and loading the data into the database?

Data latency

85
New cards

Cluster analysis: a technique used to ____ an information set into ____ _____ groups such that the members of each group are as ____ _____r as possible to one another and the different groups are as ___ ____ as possible.

a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible.

86
New cards

Classification analysis

the process of organizing data into categories or groups for its most effective and efficient use; for example, groups of political affiliation and charity donors.

87
New cards

Analysis latency

the time from which data are made available to the time when analysis is complete.

88
New cards

______ analysis is the process of organizing data into categories or groups for its most effective and efficient use; for example, groups of political affiliation and charity donors.

Classification

89
New cards

______ analysis determines values for an unknown continuous variable behavior or estimated future value.

Estimation

90
New cards

______ latency is the time it takes a human to comprehend the analytic result and determine an appropriate action.

Decision

91
New cards

Data mining

the process of analyzing data to extract information not offered by the raw data alone

92
New cards

What is the time from which data are made available to the time when analysis is complete?

Analysis latency

93
New cards

the elements of data mining

Replication, Data, Discovery

94
New cards

What is the process of collecting statistics and information about data in an existing source?

Data profiling

95
New cards

What is the process of sharing information to ensure consistency between multiple data sources?

Data replication

96
New cards

Recommendation engine

a data mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products

97
New cards

Market ______ analysis evaluates such items as websites and checkout scanner information to detect customers’ buying behavior and predict future behavior by identifying affinities among customers’ choices of products and services.

basket

98
New cards

Market basket analysis

evaluates such items as websites and checkout scanner information to detect customers’ buying behavior and predict future behavior by identifying affinities among customers’ choices of products and services.

99
New cards

Deployment

Process of implementing discoveries to drive success

100
New cards

What uses a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making?

Data mining tools