Term
|
Definition
| Programs installed on the user's computer without the user's knowledge or permission that reside in the background and, unknown to the user, observe the user's actions and keystrokes, modify computer activity, and report the user's activities to sponsoring organizations |
|
|
Term
|
Definition
| A model that represents the current situation and processes |
|
|
Term
|
Definition
| An encryption method whereby different keys are used to encode and to decode the message; one key encodes the message, and the other key decodes the message |
|
|
Term
|
Definition
| The process whereby an information system verifies(validates) a user |
|
|
Term
|
Definition
| The use of personal physical characteristics, such as fingerprint, facial features, and retinal scans, to verify users |
|
|
Term
|
Definition
| A computer program that is surreptitiously installed and that takes actions unknown and uncontrolled by the computer's owner or adminstrator |
|
|
Term
|
Definition
| The individual or organization that controls a botnet |
|
|
Term
|
Definition
| A network of bots that is created and managed by the individual or organization that infected the network with the bot program |
|
|
Term
|
Definition
| Someone who is well versed in the Porter models, organizational strategy, systems alignment theory, and who understands the proper role for technology |
|
|
Term
| Business process management (BPM) |
|
Definition
| A systematic process of modeling, creating, implementing, and assessing business processes |
|
|
Term
| COBIT (Control Objectives for Information and related Technology) |
|
Definition
| A set of standard practices created by the Information System Audit and Control Association that are used in the assessment of the BPM cycle to determine how well an information system complies with an organization's strategy |
|
|
Term
|
Definition
| A technique used to gain unauthorized access to Web pages that involves entering program code instead of data into web page text boxes |
|
|
Term
|
Definition
| Remote processing centers that provide office space, but no computer equipment, for use by a company that needs to continue operations after a disaster |
|
|
Term
|
Definition
| People who invade computer networks to obtain critical date or to manipulate the system for financial gain |
|
|
Term
|
Definition
| Whether an information system can be developed within a budget |
|
|
Term
| Cross-site scripting (XSS) |
|
Definition
| A technique used to compromise database data in which Web page scripting is injected into the server |
|
|
Term
|
Definition
| Security problem in which users are not able to access an information system |
|
|
Term
|
Definition
| A document supplied by a certificate authority (CA) that contains, among other data, an entity's name and public key |
|
|
Term
|
Definition
| Encrypted message that uses hashing to ensure that plaintext messages are received without alteration |
|
|
Term
|
Definition
| People who take computers with wireless connections through an area and search for unprotected wireless networks in an attempt to gain free Internet access or to gather unauthorized data |
|
|
Term
|
Definition
| A synonym for phising. A technique for obtaining unauthorized data that uses pretexting via e-mail |
|
|
Term
|
Definition
| The process of transforming clear text into coded, unintelligible text for secure storage or communication |
|
|
Term
|
Definition
| Algorithms used to transform clear text into coded, unintelligible text for secure storage or communication |
|
|
Term
|
Definition
| Protects consumer financial data stored by financial institutions, which are defined as banks, securities firms, insurance companies, and organizations that provide financial advice, prepare tax returns, and provide similar financial services |
|
|
Term
|
Definition
| Occurs when a person gains unauthorized access to a computer system |
|
|
Term
| Health Insurance Portability and Accountability Act (HIPAA) |
|
Definition
| Gave individuals the right to access health data created by doctors and other healthcare provides. Sets rules and limits on who can read and receive a person's health information |
|
|
Term
|
Definition
| A remote processing center run by a commercial disaster-recovery service that provides equipment a company would need to continue operations after a disaster |
|
|
Term
|
Definition
|
|
Term
|
Definition
| The process whereby an information system identifies a user by requiring the user to sign on with a user name and password |
|
|
Term
| Information systems security |
|
Definition
| The process of protecting information system vulnerabilities from threats by creating appropriate safeguards |
|
|
Term
|
Definition
| A type of spoofing whereby an intruder uses another site's IP address as if it were that other site |
|
|
Term
|
Definition
| A number used to encrypt the data |
|
|
Term
|
Definition
| A control procedure whereby a trusted party is given a copy of a key used to encrypt database data |
|
|
Term
|
Definition
| In the context of information systems, (1)to fix the system to do what it was suppose to do in the first place or (2) to adapt the system to change in requirements |
|
|
Term
|
Definition
| Viruses, worms, Trojan horses, spyware, and adware |
|
|
Term
|
Definition
| Patterns that exist in malware code |
|
|
Term
| Organizational feasibility |
|
Definition
| Whether an information system fits within an organization's customer, culture, or legal requirements |
|
|
Term
|
Definition
| A type of system conversion in which the new system runs in parallel with the old one for a while |
|
|
Term
|
Definition
| The program codes of a virus that causes unwanted or hurtful actions, such as deleting programs or data, or even worse, modifying data in ways that are undetected by the user |
|
|
Term
| Personal identification number (PIN) |
|
Definition
| A form of authentication whereby the user supplies a number that only he or she knows |
|
|
Term
|
Definition
| A type of system conversion in which the new system is installed in pieces across the organization(s) |
|
|
Term
|
Definition
| An individual or organization that spoofs legitimate companies in an attempt to illegally capture personal data |
|
|
Term
|
Definition
| A technique for obtaining unauthorized data that uses pretexting via e-mail |
|
|
Term
|
Definition
| A type of system conversion in which the organization implements the entire system on a limited portion of the business |
|
|
Term
|
Definition
| A type of system conversion in which the organization shuts off the old system and starts the new system |
|
|
Term
|
Definition
| Legislation that provides protections to individuals regarding records maintained by the U.S. government |
|
|
Term
|
Definition
| A special version of asymmetric encryption that is popular on the Internet. With this method, each site has a public key for encoding messages and a private key for decoding them |
|
|
Term
|
Definition
| Whether an information system will be able to be developed on the timetable needed |
|
|
Term
|
Definition
| A protocol that uses both asymmetric and symmetric encryption |
|
|
Term
|
Definition
| A systematic plan by which an organization addresses security issues; consists of three components: senior management involvement, safeguards of various kinds, and incident response |
|
|
Term
|
Definition
| A potential challenge to the integrity of information systems from one of three sources: human error and mistakes, malicious human activity, and natural events and disasters |
|
|
Term
|
Definition
| A plastic card similar to a credit card |
|
|
Term
|
Definition
| A technique used for intercepting computer communications |
|
|
Term
|
Definition
| A category of threats that involve manipulating a person or group to unknowingly release confidential information |
|
|
Term
|
Definition
| When someone pretends to be someone else with the intent of obtaining unauthorized data |
|
|
Term
|
Definition
| Programs installed on the user's computer without the user's knowledge or permission that reside in the background and unknown to the use, observe the user's actions and keystrokes. modify computer activity, and report the user's activity to sponsoring organizations. Malicious spyware captures keystrokes to obtain users names, passwords, account numbers, and other sensitive information. |
|
|
Term
|
Definition
| A technique used to compromise database data in which SQL code is unknowingly processed by a Web page |
|
|
Term
|
Definition
| An encryption method whereby the same key is used to encode and to decode the message |
|
|
Term
|
Definition
| The process of converting business activity from the old system to the new |
|
|
Term
|
Definition
| IS professionals who understand both business and technology |
|
|
Term
|
Definition
| The process of creating and maintaining information systems |
|
|
Term
| Systems development life cycle (SDLC) |
|
Definition
| The classical process used to develop information systems. These basic tasks of systems development are combined into the following phases: system definition, requirements analysis, component design, implementation, and system maintenance (fix or enhance) |
|
|
Term
|
Definition
| Whether existing information technology will be able to meet the needs of a new information system |
|
|
Term
|
Definition
| Safeguard that involves the hardware and software components of an information system |
|
|
Term
|
Definition
| Groups of sequences of actions that users will take when using the new system |
|
|
Term
|
Definition
| A challenge to information systems security |
|
|
Term
| Transport Layer Security (TLS) |
|
Definition
| A protocol, using both asymmetric and symmetric encryption, that works between Levels 4 (transport), and 5 (application) of the TCP-OSI protocol architecture |
|
|
Term
|
Definition
| Virus that masquerades as a useful program or file |
|
|
Term
|
Definition
| A computer program that replicates itself |
|
|
Term
|
Definition
| A virus that propagates itself using the Internet or some other computer network |
|
|