CSUF ISDS 351 Exam 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/90

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

91 Terms

1
New cards

information system

set of interrelated components that collect, process, store, and disseminate data to support fundamental business operations, data reporting, and visualization

2
New cards

information systems help with data analysis, decision making, communication, and coordination for an organization

true

3
New cards

competitive advantage

enables an organization to generate more sales or achieve superior profit margins compared to its rivals

4
New cards

cost leadership

a strategy that aims to provide a product or service at as low a price as possible compared to competitors

5
New cards

differentiation

charging higher prices for providing products that are perceived by the customer as being better

6
New cards

focus

understanding and servicing a target market better than anyone else

7
New cards

leavitt diamond

a model of organizational change that says if one key element is changed it likely impacts other elements; structure, tasks, technology, and people

<p>a model of organizational change that says if one key element is changed it likely impacts other elements; structure, tasks, technology, and people</p>
8
New cards

personal information system

improve the productivity of individual users in performing stand alone tasks

9
New cards

workgroup information system

support teamwork and enable people to work together effectively, regardless of location

10
New cards

enterprise information system

meet organizational business needs and share data with other enterprise applicants used within the org

11
New cards

interorganizational information system

enables the sharing of information across organizational boundaries

12
New cards

value chain

a series of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased

13
New cards

supply chain

key value chain whose primary activities include inbound logistics, operations, outbound logistics, marketing and sales, and service

14
New cards

strategic planning

process that helps managers identify initiatives and projects that will achieve organizational objectives

15
New cards

certification

process for testing skills and knowledge; successful completion = endorsement

16
New cards

careless insider

an inside (employee, business partner, contractor, consultant) who does not follow the organization's security polices and enables a cyberattack to occur

17
New cards

malicious employees

an insider who deliberately attempts to gain access to and/or disrupt a company's information systems and business operations

18
New cards

cybercriminal

someone who attacks a computer system or network for financial gain

19
New cards

hacktivist

an individual who hacks computers and websites in order to promote political ideology

20
New cards

lone wolf attacker

someone who violates computer or internet security maliciously or for illegal personal gain

21
New cards

cyberterrorist

state-sponsored individual/group who attempts to destroy the infrastructure components of governments, financial institutions, etc

22
New cards

attack vector

gain unauthorized access to a device or network and initiate cyber attack

23
New cards

advanced persistent threat

intruder gains access to a network and stays there undetected with the intention of stealing data over a long period of time

24
New cards

blended threat

sophisticated threat that combines the features of a virus, worm, trojan horse, and other malicious code into a single payload

25
New cards

phishing

fraudulent practice of sending emails to get the recipient to reveal personal data

26
New cards

root kit

a set of software tools that enable an unauthorized user to gain control of a computer system without being detected

27
New cards

smishing

variation of phishing that involves the use of texting

28
New cards

spam

use of email systems to send unsolicited email to large numbers of people

29
New cards

social engineering

using deception to obtain unauthorized access to information resources

30
New cards

trojan horse

seemingly harmless program in which malicious code is hidden

31
New cards

virus

piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner

32
New cards

vishing

a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information

33
New cards

worm

resides in the active memory of the computer and duplicates itself

34
New cards

direct impact

value of assets stolen or damaged due to cyberattack

35
New cards

business disruption

organization is unable to operate in an effective manner for hours/days and can cause a loss of business/customers

36
New cards

recovery cost

may take organization days/weeks to repair affected systems or recover lost data

37
New cards

legal consequences

prospect of monetary penalties for businesses that fail to comply with data protection legislation

38
New cards

reputation damage

eroded trust your organization has established with customers and suppliers

39
New cards

cia triad

confidentiality, integrity, availability

40
New cards

confidentiality

ensures that only those individuals with the proper authority can access data/information

41
New cards

integrity

ensures data can be changed only by authorized individuals

42
New cards

availability

ensures that the data can be accessed when and wherever

43
New cards

biometric authentication

uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users

44
New cards

firewall

a part of a computer system or network that is designed to block unauthorized access

45
New cards

next generation firewall

can detect and block sophisticated attacks by filtering network traffic dependent on the packet contents

46
New cards

routers

provides the capability to specify the unique media access control address of each device connected to the network and restrict access to the network

47
New cards

encryption

the process of scrambling messages or data in such a way that only authorized parties can read it

48
New cards

encryption key

value that is applied, using an algorithm, to a set of unencrypted text to produce encrypted text that appears as a series of seemingly random characters (ciphertext), which unreadable by those without the encryption key

49
New cards

symmetric algorithm

use the same key for encryption and decryption

50
New cards

asymmetric algorithm

two separate keys for encryption and decryption

51
New cards

transport layer security

a communication system of rules that ensures privacy between communicating applications and their users

52
New cards

proxy servers serve as an intermediary between a web browser and another server

true

53
New cards

vpn

virtual private network, enables remote users to securely access computing and storage devices and share data remotely

54
New cards

network administrator

is responsible for monitoring network security web sites frequently and downloading updated antivirus software as needed

55
New cards

computer forensics

discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law

56
New cards

cce

certified computer examiner

57
New cards

cissp

certified information systems security professional

58
New cards

csfa

cybersecurity forensic analyst

59
New cards

gcfa

global information assurance certification certified forensics analyst

60
New cards

ethics

set of principles about what is right and wrong for individual's decision making

61
New cards

law

system of rules that tells us what we can and cannot do

62
New cards

fostering csr

gaining the goodwill of the community, creating an organization that operates consistently, fostering good business practices, avoiding unfavorable publicity, and protecting the organization and its employees from legal action

63
New cards

professional code of ethics

outlines what the organization aspires to become and consists of rules and principles by which members of the organization are expected to abide

64
New cards

defamation

making either an oral (slander) or a written (libel) statement of alleged fact that is false and harms another person

65
New cards

safety critical systems

failure may cause human injury or death and takes longer and is more expensive than high-quality systems

66
New cards

information

a collection of data that is organized and processed

67
New cards

knowledge

awareness and understanding of a set of information

68
New cards

data management

integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed which ensures accessibility, reliability, and timeliness of the data

69
New cards

accessible

easily obtainable & meets needs

70
New cards

accurate

error free

71
New cards

complete

contains all important facts

72
New cards

economical

avoids waste when being produced

73
New cards

relevant

relates to the decision maker

74
New cards

reliable

can be trusted by users

75
New cards

secure

cannot be access by unauthorized users

76
New cards

timely

delivered when needed

77
New cards

verifiable

able to check if correct

78
New cards

data cleansing

process of detecting and correcting incomplete, inaccurate, or irrelevant records that reside in a database

79
New cards

big data

data collections that are so enormous and complex that traditional data management that all soft and hardware are incapable of dealing with

80
New cards

bank secrecy act

detects and prevents money laundering by requiring financial institutions to report certain transactions to government agencies and to withhold from clients that such reports were filed about them

81
New cards

data mart

contains a subset of data warehouse information

82
New cards

data warehouse characteristics

large, multiple sources, historical, cross organizational analysis, and supports various types of analyses and reporting

83
New cards

hipaa

protects health information by requiring verbal or written authorization for release of information

84
New cards

basel ii accord

creates international standards that strengthen global capital and liquidity rules

85
New cards

california senate bill

protects consumers from identity theft, 1386

86
New cards

global data regulation

increases the rights of individuals and gives them more control over their information

87
New cards

foreign account tax compliance act

identifies u.s. taxpayers who hold financial assets in non-u.s. financial institutions and offshore accounts

88
New cards

gramm leach bliley act

protects the privacy and security of individually identifiable financial info

89
New cards

velocity

the rate at which new data is being generated

90
New cards

value

refers to the worth of the data in decision making

91
New cards

veracity

measure of the quality of the data