IT GOVERNANCE, ETHICAL, AND SECURITY ISSUES

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/80

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

81 Terms

1
New cards

Data Governance (DG)

basic level that implements IG. It refers to the involvement of various processes and controls in order to ensure that data and information gathered are unique, true, and accurate and can meet the prescribed standards and business rules in a system.

2
New cards

Data Governance (DG)

ensures that formal management controls (systems, processes, and accountable people) are implemented to improve the quality of data and to avoid the critical effects of poor data.

3
New cards

Data Governance (DG)

It enables a business organization to have control over the management of its data assets and ensures that the data collected and processed fit the organization's intended purpose.

4
New cards

Elements of Data Governance

  • People

  • Process

  • Technology

5
New cards

People

The core of data governance (DG) is the team responsible for a business's data assets. They must ensure that DG initiatives align with business needs and data requirements.

6
New cards

Process

In data governance, it is very important that data processes are clearly developed.

7
New cards

Technology

Business organizations should understand that data governance cannot be successful with the use of technology alone.

8
New cards

Information Technology Governance Framework

  • Control Objectives for Information and Related Technology (CobiT)

  • Information Technology Infrastructure Library (ITIL).

9
New cards

Control Objectives for Information and Related Technology (CobiT)

widely adopted ITG framework that has a more process–based approach. It is developed by the IT Governance Institute under the Information Systems Audit and Control Association (ISACA).

10
New cards

Information Technology Infrastructure Library (ITIL)

refers to a set of an organization's best process oriented practices that is identified in order to regulate the delivery of its IT services management. This approach is widely acceptable for both public and private sectors that focus on IT service management.

11
New cards

Information Governance (IG)

In any business organization, corporate governance is considered as the highest level of governance. The key characteristic of this type of governance is IG

12
New cards

Functions of Information Governance and Information Technology

  • An IT department is essential for managing networks, data, servers, and applications.

  • Business users are responsible for governing reports and databases.

  • Information must comply with legal, regulatory, and industry standards.

  • Implementing information governance (IG) for email communications is essential.

13
New cards

Electronic mail (e–mail)

is one of the major areas that information governance should focus on. Commonly used as a communication tool by most business organizations.

14
New cards

Software Attacks

Malware (or malicious software) is a program or code that is designed to infiltrate a system and execute malicious operations and controls.

15
New cards

Categories of Malware

  • Infection methods

  • Malware actions

16
New cards

Infection Methods

  • Virus

  • Worms

  • Trojan

17
New cards

Virus

has the ability to clone itself multiple times and attach itself to a program of a computer through files such as videos, songs, and so on. It is capable of traveling through a system and/or the Internet.

18
New cards

Virus

it inserts itself into a fie or executable program

19
New cards

Virus

it deletes or modifies files, sometimes it can also change the location of files

20
New cards

Worms

Similar to a virus, worms are able to replicate themselves. Instead of attaching itself to a program, it infects computers that are within a network.

21
New cards

Worms

It can spread through computers only if they are connected by a network.

22
New cards

Worms

it exploits a weakness in an application or operating system by replicating itself

23
New cards

Worms

it usually only monopolize the CPU and memory

24
New cards

Trojan

Trojan attacks originate from the Greek myth of the Trojan Horse, where the Greeks hid inside a wooden horse to attack Troy. Similarly, Trojans disguise themselves in legitimate software, executing malicious actions when opened.

25
New cards

Malware Actions

  • Adware

  • Spyware

  • Ransomware

  • Rootkits

  • Scareware

  • Zombies

  • Theft of intellectual property

  • Identity theft

  • Information extortion

  • Theft of equipment and information

  • Sabotage

26
New cards

Adware

is not malicious, however, it breaches users' privacy. It usually displays ads on anyone's computer desktop or in any individual program. It is normally associated with free software.

27
New cards

Spyware

True to its name, it works just like a spy by monitoring a user's computer activities and gathering information that might be of interest to a third party.

28
New cards

Keylogger

a common spyware that records timestamped keystrokes of a user and takes important personal information such as usernames, pins and passwords, credit card information, and so on.

29
New cards

Ransomware

has the ability to encrypt files and lock a computer, rendering them inaccessible. Information on the screen is then shown to make the user aware of the cost it would take to unlock the computer.

30
New cards

Rootkits

it is devised to give a hacker administrative control in a computer's system. This gives him/her the power to perform whatever task on the system.

31
New cards

Scareware

disguises itself as a tool that will help fix a computer system, that if activated, infects and completely damages a system.

32
New cards

Zombies

works just like a spyware; however, it does not necessarily spy on the user's activity. Instead, it stays put until commanded by the hacker.

33
New cards

Theft of Intellectual Property

This is considered as a violation against intellectual property rights, which involves copyright and patents, among others.

34
New cards

Identity Theft

This is the action of impersonating someone in order to acquire his/her information.

35
New cards

Information Extortion

This refers to the stealing of a business organization's information for a certain amount of money.

36
New cards

Theft of Equipment and Information

Because of modern technology, particularly mobile devices, it has become easier for hackers and thieves to steal information and gadgets.

37
New cards

Sabotage

Sabotaging a company with the use of technology could be through destroying their website which would lead to customer dissatisfaction.

38
New cards

Types of Computer Security Threats and Internet Threats

  • Computer virus

  • Rogue security software

  • Trojan horse

  • Adware and spyware

  • Computer worm

  • DoS and DDoS attacks

  • Phishing

  • Rootkit

  • SQL injection attack

  • Man–in–the–middle attack

  • Spam

  • Keyloggers

  • Pharming

39
New cards

Computer virus

among the most common threats against cybersecurity. A computer virus can spread easily due to its various manifestations such as downloaded files or e–mail attachments.

40
New cards

Rogue security software

used to deceive users that their systems are infected with a virus or that they have outdated security measures.

41
New cards

Trojan horse

malicious software or code that disguises itself as a genuine program, fooling users to install it.

42
New cards

Adware and spyware

Software that tracks browsing behavior to suggest pop–up ads can slow down internet and processor speeds. Spyware, however, is secretly installed without consent and can steal personal data like emails and passwords, leading to identity theft.

43
New cards

Computer worm

form of malware that replicates itself quickly through contact lists of infected computers.

44
New cards

DoS and DDoS attacks

A denial–of–service (DoS) is caused by a computer system connected to the Internet. A DoS attack can be a flooded website, preventing users from accessing the website's contents.

45
New cards

Phishing

involves collecting sensitive user information, which are usually passwords and credit card numbers Phishing is usually done through e–mails or messages that are disguised as genuine.

46
New cards

Rootkit

allows a hacker to obtain administrative access on a user's computer and/or network. A rootkit enters a computer by appearing as a legitimate program or software that is installed and allowed to make changes on the system.

47
New cards

SQL injection attack

compromise data confidentiality by exploiting security flaws in data–driven applications to collect, alter, or delete sensitive data and disrupt website transactions. Man–in–the–middle attack

48
New cards

Man in the middle attack

This type of attack allows a hacker to tap and listen to conversations between two people. The hacker can interrupt a conversation between two entities by appearing as one of them while obtaining their private keys

49
New cards

Spam

may not be a direct threat; however, these e–mails may contain malware.

50
New cards

Keyloggers

It is similar to a spyware through which it records a user's keyboard actions. Like a sniffing attack, most keyloggers are simply looking for discernable keyboard entries, such as bank card details, passwords, and personal information.

51
New cards

Pharming

more complicated version of phishing which misuses the domain name system (DNS) Pharmers regularly create web pages that copy that of a reliable business, such as an online banking log–in page.

52
New cards

Solutions to Overcome Security Threats

  • Install an anti–virus software

  • Ensure that the anti–virus software is up–to–date

  • Employ a firewall to protect networks

  • Filter all e–mail traffic

  • Back–up critical data regularly

  • Educate users about suspicious e–mails

  • Scan downloads from the internet

  • Implement an information security policy

  • Implement and monitor user and system logs

  • Create and report an incident response plan

  • Restrict end–user access to systems

53
New cards

Install an Anti–virus software

Making sure that a licensed anti–virus software is installed on all computers such as laptops, personal computers, and servers is important to prevent computer security threats.

54
New cards

Ensure that the anti–virus software is up–to–date

Almost every day, new versions of computer viruses are being released, and it is critical that businesses are shielded from these viruses by keeping their anti–virus up–to–date.

55
New cards

Employ a firewall to protect networks

As virus can spread not only by e–mail, it is essential to employ a firewall to block traffic from entering a network.

56
New cards

Filter all e–mail traffic

All sent and received e–mails should be scanned for viruses because they could sneak their way into attachments such as EXE, COM, and SCR files.

57
New cards

Back–up critical data regularly

Regularly backing up important files on internal or external devices ensures a trusted data source if the network is infected with a virus.

58
New cards

Educate users about suspicious e–mails

Users should exercise caution when opening email attachments or clicking links from unknown senders.

59
New cards

Scan downloads from the Internet

Downloaded files from the Internet should be scanned before using and opening to ensure that no viruses could enter the computer's system.

60
New cards

Implement an information security policy

An information security policy must be created to make sure that it receives its required profile to secure an organization's systems and data.

61
New cards

Implement and monitor user and systems logs

Monitoring user and systems logs can help detect and track suspicious activities.

62
New cards

Create and report an incident response plan

It is necessary to have an incident response plan during and after a computer security threat or attack.

63
New cards

Restrict end–user access to systems

Local users must not be given administrative privileges on their assigned workstations.

64
New cards

Ethical Issues in Information Technology

  • Privacy

  • Hacking

  • Virus

  • Data access rights

  • Plagiarism

  • Ergonomy

  • Health issues

65
New cards

Privacy

individual’s right to control what information others can know about you, who can access it, and when. Internet privacy refers to the protection of personal data shared online.

66
New cards

Hacking

generally refers to the unauthorized entry into a computer network. A person facilitating hacking activities is known as a hacker.

67
New cards

Hacker

a person who breaks programming codes and passwords to benefit from the unauthorized entry or access to computer systems.

68
New cards

Virus

is a malicious software that could damage a computer system upon its installation. It can replicate themselves and enter and infect files.

69
New cards

Data access rights

the permission granting the location and reading of digital information to a user or computer program. It is important for information security and compliance.

70
New cards

Plagiarism

is known as the practice of taking someone else's work or ideas and passing them off as one's own It is commonly being experienced at schools, offices, and organizations.

71
New cards

Ergonomy

refers to the improvement of IT tools to make them more efficient for users.

72
New cards

Health issues

play a significant part in the provision of quality care, controlled costs, and efficiency boosts.

73
New cards

Technology Innovation Regarding Health Care

  • Health informatics

  • Mobile health and BYOD

  • Wireless networking T

  • elemedicine

  • Patient engagement

  • Clinical data analysis

  • Storage infrastructure

  • Cloud–based electronic health record system

74
New cards

Health informatics

There are health policies being refined and created that will require all health organizers and providers to demonstrate the meaningful use of all medical benefits and support.

75
New cards

Mobile health and BYOD

demand of using mobile technologies nowadays has reached healthcare industry.

76
New cards

Wireless networking

Healthcare providers increasingly rely on wireless network access in medical facilities, requiring numerous access points and wireless WANs to function effectively.

77
New cards

Telemedicine

Constant change in the policies that dictate how telemedicine is used and reimbursed interferes with its proper implementation.

78
New cards

Patient engagement

Putting a significant amount of healthcare responsibility on a patient can be challenged.

79
New cards

Clinical data analysis

Data analytics can provide assistance in the treatment and prevention of illnesses.

80
New cards

Storage infrastructure

Data retention laws are created to limit the number & length of time data can be stored.

81
New cards

Cloud–based electronic health record system

The cloud is an online storage infrastructure that raises concerns about data encryption, ownership, WHO compliance, and security