Shared Flashcard Set

Details

Management information system
Chapter 12
49
Management
Undergraduate 1
12/02/2014

Additional Management Flashcards

 


 

Cards

Term
Threat
Definition
A person organization that seeks to obtain or alter data or other assets illegally
Term
Vulnerability
Definition
An opportunity for threats to gain access to individual or organizational assets
Term
Safeguard
Definition
Some measure that individuals or organizations take to block the threat from obtaining the asset.
Term
Target
Definition
The asset that is desired by the threat
Term
Sources of Threats
Definition
Human error, Computer crime, Natural events and disasters
Term
Types of Security Loss
Definition
Unauthorized data disclosure, incorrect data modification, faulty service, denial of service and loss of infrastructure
Term
Unauthorized data disclosure
Definition
Occurs when a threat obtains data that is supposed to be protected
Term
Pretexting
Definition
Occurs when someone deceives by pretending to be someone else
Term
Phishing
Definition
A similar technique for obtaining unauthorized data that uses pretexting via email
Term
Phisher
Definition
Pretends to be a legitimate company and sends an email requesting confidential data such as account numbers, social security numbers, account passwords, and so forth
Term
Spoofing
Definition
Another term for someone pretending to be someone else
(Pretending to be your professor "spoofing your professor")
Term
IP Spoofing
Definition
Occurs when and intruder uses another's sites IP address to masquerade as that other site
Term
Email Spoofing
Definition
Is a synonym for phishing
Term
Sniffing
Definition
Is another term for intercepting computer communications
Term
Drive-by Sniffers
Definition
Take computers with wireless connections through an area and search for unprotected wireless networks
Term
Hacking
Definition
Which is breaking into computers, servers, or networks to steal data such as computer lists product inventory data, employee data and other proprietary confidential data
Term
Incorrect Data Modification
Definition
Examples- Incorrectly increasing a customer's discount or incorrectly modifying an employee's salary, earned days of vacation, or annual bonus.
Term
Faulty Service
Definition
Problems that result because of incorrect system operation. Can include incorrect data modification, systems that work incorrectly by sending the wrong goods to a customer or the ordered goods to the wrong customer, incorrectly billing customers, or sending the wrong information to employees
Term
Usurpation
Definition
Occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data or other purposes
Term
Denial of Service (DOS)
Definition
Human error in following procedures or a lack of procedures
Term
Loss of infrastructure
Definition
Examples- A bulldozer cutting a conduit of fiber-optics cables and the floor buffer crashing into a rack of web servers
Term
Advanced persistent Threat (APT)
Definition
A sophisticated, possibly long running, computer hack that is perpetrated by large, well funded organizations like governments
Term
Intrusion Detections System (IDS)
Definition
A computer program that senses when another computer is attempting to scan the disk or otherwise access a computer
Term
Brute force attack
Definition
In which a the password cracker tries every possible combination of characters
Term
Technical Safegaurds
Definition
Involve the hardware and software components of an information system
Term
Smart Card
Definition
A plastic card similar to a credit card they have a microchip which holds far more data than a magnetic strip. Users of smart cards a required to have a PIN to be authenticated
Term
Encryption
Definition
Is the process of transforming clear text into coded, unintelligible text for secure storage or communication.
Term
Encryption algorithms
Definition
Procedures for encrypting data that are difficult to break
Term
Key
Definition
Number used to encrypt the data
Term
Symmetric Encryption
Definition
The same key (again a number) is used to encode and to decode
Term
Asymmetric Encryption
Definition
Two keys are used one key encodes the message and the other decodes the message
Term
Public key/Private Key
Definition
Is used on the internet with this method each site has a public key for encoding messages and a private key for decoding them
Term
HTTPS
Definition
Most secure communications over the internet use this protocol
Term
Secure Socket Layer (SSL) Transport Layer Security(TLS)
Definition
Uses a combination of public private key and symmetric encryption
Term
Firewalls
Definition
Is a computing device that prevents unauthorized network access
Term
Perimeter Firewall
Definition
Sits outside the organizational network; it is the first device that internet traffic encounters
Term
Internal Firewalls
Definition
Inside the organizational network
Term
Packet-filtering Firewall
Definition
Examines each part of a message and determines whether to let that part pass
Term
Malware
Definition
Viruses, worms, Trojan horses, spyware, and adware
Term
Virus
Definition
A computer program that replicates itself
Term
Payload
Definition
The program code that causes unwanted or harmful activity
Term
Trojan Horses
Definition
Viruses that masquerade as useful programs or files
Term
Worm
Definition
Virus that propagates using the internet or other computer network
Term
Spyware
Definition
Programs that are installed on the user's computer without the user's knowledge or permission
Term
Adware
Definition
Similar to spyware but it watches user activity and produce pop-up ads
Term
Data safeguards
Definition
Protect databases and other organizational data
Term
Data administration
Definition
Refers to an organization wide function that is in charge of developing data policies and enforcing data standards
Term
Database administration
Definition
Refers to a function that pertains to a particular database
Term
Human Safeguards
Definition
Involve the people and procedure components of information system
Supporting users have an ad free experience!