Shared Flashcard Set

Details

CIS201 CH08 Terminology
Information Systems for Business Chapter 08
93
Other
Undergraduate 2
02/26/2012

Additional Other Flashcards

 


 

Cards

Term
Active Content
Definition
executable files on websites
Term
Antivirus software
Definition
programs that look for virus signatures or variations of them in files and systems
Term
Application-level Firewall
Definition
firewall that verifies access to applications by requiring users to log into the firewall before they can access applications inside the organization (from outside).
Term
Asymmetric Encryption
Definition
uses two keys: a public key for encrypting and a private key for decrypting
Term
Asymmetric Security Warfare
Definition
one party must do everything to protect itself, while the other party (the attacker) only needs to find the one security weakness.
Term
Audit Logs
Definition
software programs that can scan for unexpected actions to detect potential hackers
Term
Authentication
Definition
process by which the identity of a transacting party is verified
Term
Authentication (Biometrics)
Definition
matching the individual with his/her stored biometric data
Term
Availability
Definition
system and/or data are available when needed
Term
Backdoors
Definition
ways for hackers to re-access the compromised system at will.
Term
Behavioral Biometrics
Definition
biometrics that use human behavior
Term
Behavioral-Based Antivirus Protection Tools
Definition
programs that look for suspicious behaviors in programs instead of just a virus' signature.
Term
Biometrics
Definition
technologies that use human features to recognize individuals and grant them access
Term
Cipher
Definition
algorithm used to encrypt and decrypt plaintext
Term
Ciphertext
Definition
encrypted (unreadable) message
Term
Confidentiality
Definition
making sure only authorized individuals can access information or data
Term
Corrective controls
Definition
controls meant to repair damages after a security problem has occurred
Term
Decryption
Definition
converting ciphertext back to plaintext
Term
Decryption key
Definition
key used to convert unreadable text into its original form
Term
Defense in depth
Definition
multiple layers of security protection in place
Term
Denial of service threats
Definition
threats that render a system inoperative or limit its capability to operate, or make data unavailable
Term
Detective controls
Definition
controls meant to find or discover where and when security threats occur
Term
Dictionary attack
Definition
when all words of several dictionaries in multiple languages are tested as passwords with numbers before and after the words
Term
Disaster recovery
Definition
procedures and tools to recover systems affected by disasters and destruction
Term
Distributed denial of service attacks (DDOS)
Definition
when many computers are being used for DOS attacks
Term
DNA recognition
Definition
analyses segments from an individual DNA
Term
Dynamic firewall
Definition
manages the requests as they occur, deciding on both denials and permissions as they arrive
Term
Dynamic Signature Recognition
Definition
analyses not only the signature but how it is written using pressure points
Term
Ear Recognition
Definition
analyses the shape of the ear
Term
Email Bombing
Definition
sending a large number of requests, emails, or synchronization (SYN) messages to fill a target's mailboxes, systems, communication ports, or memory buffers, with the intent of blocking legitimate messages from entering the systems or overloading the system to make it crash
Term
Encryption
Definition
application of a mathematical algorithm to a message or information that scrambles that message or information to make it unreadable
Term
Encryption key
Definition
key used to convert the text into unreadable form
Term
External firewall
Definition
firewall used to protect access to the internal network and computers of the organization
Term
Facial recognition
Definition
Analyses facial features or patterns
Term
Finger geometry recognition
Definition
analyses 3D geometry of the finger
Term
Fingerprint recognition
Definition
analyses ridges and valleys (minutiae) on the surface tips of human fingers
Term
Firewall
Definition
computer or a router that controls access in and out of the organization's networks, applications, and computers
Term
Firewall appliance
Definition
the hardware and software to perform firewall function
Term
Gait Recognition
Definition
analyses the walking style of gait of individuals
Term
Hactivism
Definition
hackers that try to find information that, if revealed, will advance human causes
Term
Hand Geometry Recognition
Definition
Analyses geometric features of the hand such as length of fingers and width of the hand
Term
Host firewall
Definition
firewall installed on a computer
Term
Identification (biometrics)
Definition
identifying an individual from an entire population of individuals with stored biometric data
Term
Information security
Definition
set of protections put in place to safeguard information systems and/or data from security threats such as unauthorized access, use, disclosure, disruption, modification, or destruction
Term
Integrity
Definition
when data are consistent and complete
Term
Internal firewall
Definition
firewall used inside an organization, between departments or divisions
Term
Iris/retina recognition
Definition
analyses features (eyeprints) in the iris (iris) or the patterns of veins in the back of the eye (retina)
Term
Key pair
Definition
a set of linked public key and private key
Term
Keystroke capture programs
Definition
software that logs all information entered into a computer
Term
Keystroke recognition
Definition
analyses rhythm and patterns of keystroke of individuals on a keyboard
Term
Knowledge
Definition
when an individual needs to know something to gain access
Term
Logical access controls
Definition
security solutions that protect access to systems, applications, or data by ensuring users or systems are authenticated and allowed to have such access
Term
Nonrepudiation
Definition
making sure a party cannot renege on obligations, for example by denying that they entered into a transaction with a Web merchant
Term
Packet-level Firewall
Definition
also called a screening level firewall, controls access by looking at the source and destination addresses in data packets
Term
Packets
Definition
small units of data that flow through networks, allowing for the transmission of messages
Term
Password Crackers
Definition
software used to recover passwords that are forgotten
Term
Personal Firewall
Definition
firewall installed on a given personal computer
Term
Physical Access Controls
Definition
controls that involve protecting the physical access to systems, applications, or data
Term
Physiological Biometrics
Definition
using physical traits to identify individuals
Term
Plaintext
Definition
original message before it is encrypted
Term
Possession
Definition
when an individual owns a form of identification
Term
Preventive Controls
Definition
controls meant to stop or limit the security threat from happening in the first place
Term
Risk Management
Definition
the process of identifying, assessing, and prioritizing the security risks an organization may face, and deciding whether to accept, mitigate, or shape the security risks
Term
Rootkits
Definition
software that allow hackers to have unfettered access to everything on the system, including adding, deleting, and copying files
Term
Security
Definition
Protection against security threats
Term
Security Levels
Definition
the layers of protection technologies and policies used to secure stored information
Term
Security Policies
Definition
descriptions of the general security guidelines for an organization.
Term
Security Procedures
Definition
specific statements describing how to implement the security policies.
Term
Security Threat
Definition
broadly categorized as denial of service, unauthorized access, and theft and fraud.
Term
Smurfing
Definition
a hacker uses an innocent third party to multiply the messages being sent to the intended target.
Term
Sniffer
Definition
software that monitors transmissions, capturing unauthorized data of interest.
Term
Social Engineering
Definition
tricking individuals into giving out security information.
Term
Software Ports
Definition
applications installed and running on a computer
Term
Spamming
Definition
sending e-mails to many individuals at once, sending unsolicited commercial e-mail to individuals, or targeting one individual computer or network and sending thousands of messages to it.
Term
Spoofing
Definition
pretending to be someone else (or another computer) to enter a system or gain attention.
Term
Spyware
Definition
a form of virus that logs everything a user is doing on their computer, unbeknownst to them.
Term
Static Firewall
Definition
a firewall that has predetermined ways of dealing with transmission requests.
Term
Static Signature Recognition
Definition
compares scanned or ink signatures with stored signatures.
Term
Stealth Virus
Definition
more advanced virus that changes its own bit pattern to become undetectable by virus scanners.
Term
Symmetric Encryption
Definition
encryption where the same key is used for encrypting and decrypting data
Term
Target-of- Opportunity Threats
Definition
threats (such as viruses) send out to find any victim possible
Term
Theft and fraud threats
Definition
threats related to the loss of systems or data due to theft or fraudulent activities
Term
Traits
Definition
physical or behavioral human characteristics are needed to gain access of systems or data
Term
Trojan horses
Definition
viruses embedded into a legitimate file
Term
Unauthorized access threats
Definition
individuals who access systems and/or data illegally
Term
User profile
Definition
assigned profiles that consist of a user identification, a password, and a set of privileges
Term
Virus
Definition
computer program designed to perform unwanted events
Term
Virus hoaxes
Definition
false virus alerts sent and resent by individuals
Term
Virus signature
Definition
bit patterns of the virus that can be recognized
Term
Voice recognition (speaker recognition)
Definition
Analyses voice to determine the identity of a speaker; different from speech recognition (determining what is being said)
Term
Wi-Fi Protection access (WPA)
Definition
recent and powerful encryption algorithm for wireless security
Term
Wired Equivalent Privacy (WEP)
Definition
older encryption algorithm for wireless security
Term
Worms
Definition
viruses that can propagate themselves throughout the internet with no user intervention
Supporting users have an ad free experience!