Essentials of Management Information Systems - Securing Information Systems

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

Flashcards focusing on key vocabulary related to securing information systems from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Ransomware

A malicious software that encrypts data and demands payment for the decryption key.

2
New cards

Malware

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

3
New cards

Denial-of-service (DoS) attack

A cyber attack intended to shut down a machine or network, making it inaccessible to users.

4
New cards

Phishing

A method of trying to gather personal information using deceptive e-mails and websites.

5
New cards

Cyberterrorism

The use of technology to disrupt and damage systems for the purposes of political gain.

6
New cards

Firewalls

Security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.

7
New cards

Encryption

The process of converting information or data into a code to prevent unauthorized access.

8
New cards

Identity and Access Management (IAM)

Processes and technologies for managing user identities and access to resources.

9
New cards

Security Policy

A formalized set of rules that members of an organization must follow regarding information security.

10
New cards

Access Control

A security technique that regulates who or what can view or use resources in a computing environment.