Information Systems Final Chapter 8

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Ransomware

(malware)- tries to extort money from users by taking control of their devices or displaying pop up messages

Why are systems vulnerable?

Info systems in different locations are all connected. Unauthorized access can occur through one location and get into the entire network. Internet pages are more vulnerable because they are open to anyone. This can cause widespread impact. Vulnerability has spread through email, instant message, and peer to peer file sharing. Hackers can access wifi and Bluetooth

What is the business value of security and control?

Some companies don't want to spend a lot on security because it is not directly related to sales. Businesses have all of their valuable info to protect. Inadequate security and control may result in serious legal liability. Government regulations force businesses to take security and control seriously.

Computer crime

any violation of criminal law involving knowledge of computer technology for their perpetration, investigation, or prosecution.

NAT

conceals IP addresses of internal host computers

(SSL)

enable client and server computers to manage encryption and decryption activities as they communicate with each other during a secure web session - Establishes connection between two computers

Sarbanes-Oxley act

ensures accuracy and integrity of financial info that is used internally and released externally.

DPI

examines data files and sorts out low priority online materials while assigning high priority to business-critical files

Intrusion Detection System

full time monitoring tools placed at the most vulnerable points of=r hot spots of corporate networks to detect and deter intruders continually.

War driving

hackers drive by buildings or park outside and try to intercept wireless network traffic

Spoofing

hackers misrepresent themselves by using fake email addresses

Zero day vulnerabilities

holes in software unknown to creator. Patches- repairs flaws

Identity theft

imposter gains personal information

Worms

independent computer programs that copy themselves - spread from files of downloaded software

Spyware

install themselves onto computers to monitor web browsing

Hacker

intends to gain unauthorized access to computer

Malware

malicious software programs

Drive-by downloads

malware that comes with a downloaded file that users intentionally or unintentionally request.

Controls

methods, policies, and organizational procedures that ensure the safety of the organizations assets, the accuracy and reliability of its records, and operational adherence to management standards

MSSP

monitor network activity and preform vulnerability testing and intrusion detection

HIPPA

outlines medical security and privacy rules and procedures for simplifying the administration of healthcare billing and automating the transfer of healthcare data between health care providers, payers, and plans

Antivirus software

prevents, detects, and removes malware, including computer viruses, computer worms, Trojan horses, spyware, and adware

Encryption

process of transforming plain text or data into cipher text which cannot be read by anyone but the sender and intended receiver

(S-HTTP)

protocol used for encrypting data flowing over internet but limited to individual message

Keyloggers

record keystrokes made on computer

Pharming

redirects users to bogus web page

Security

refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to info systems

Gramm Leach Bliley Act

requires financial institutes to ensure the security and confidentiality of customer data

Computer virus

rogue software program that attaches itself to other programs or data files to be executed, usually without use knowledge or permission

Computer forensics

scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the info can be used as evidence in court of law.

(UTM)

single appliance combining security tools

Trojan horse

software program that appears benign but then does something other than expected

Phishing

spoofing where fake emails are made to look real and ask for personal information

Cyberwarfare

state sponsored activity designed to cripple and defeat another state or nation by penetration their software Software errors post threat to info systems. Hidden bugs is a major problem of software.

SQL injection attacks

take advantage of vulnerabilities in poorly coded web applications and introduce malicious program codes into a company's system.

Sniffer

type of eavesdropping software that monitors info traveling over a network

PKI

use of public key cryptography

Distributed denial

uses multiple computers

Public key encryption

uses one shared key and one private key to send and read messages

Two factor authentications

validates users by multistep process aka two means of identification

Click fraud

when individual fraudulently clicks on an online ad without intention

Denial of service attack

when multiple hackers flood a network server with false communications and requests the service cannot service real requests

Evil twins

wifi that appears to offer trustworthy wifi but its fake

Multitier client/server computing can introduce vulnerability including:

• System malfunction if computer breaks (could lose data) • Domestic/offshore partnering with another company (valuable info could get into wrong hands) • Handheld mobile devices (vulnerable to malicious software from outsiders)


Kaugnay na mga set ng pag-aaral

Lesson 9 - Fair Labor Standards Act

View Set

Chapter 15- Psychological Disorders

View Set

Text Questions Chapter 12 biol 222

View Set

Personal Finance Ch. 6 Multiple Choice Questions

View Set

CH 3: Computers and Mobile Devices

View Set