ISTM- 209 exam 2

Ace your homework & exams now with Quizwiz!

Automated security tools

Is it ethical to release into the wild tools that can automate attacks on a broad array of systems?

What is the correlation between privacy and confidentiality?

Privacy is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent. Privacy is related to confidentiality, which is the assurance that messages and information remain available only to those authorized to view them. Each time employees make a decision about a privacy issue, the outcome could sink the company.

National Risk Management Center (NRMC):

The NRMC is a planning, analysis, and collaboration center that works in close coordination with the private sector and other key stakeholders to identify, analyze, prioritize, and manage the most strategic risks to the nation's critical infrastructure and functions.

Vulnerability disclosure

When and how should researchers inform the public about vulnerabilities in widely used products? What steps should be taken before any such notification?

business-critical integrity constraints:

enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints.

Ransomware:

malicious software that infects your computer and asks for money -Ransomware is malware for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key -spreads through email attachments, infected programs, and compromised websites.

real-time data:

means immediate, up-to-date data

There are two types of integrity constraints:

(1) relational and (2) business critical.

Attributes:

(also called columns or fields) are the data elements associated with an entity

Entity:

(also referred to as a table) stores data about a person, place, thing, transaction, or event.

Capability Maturity Model Integration (CMMI) method

-Capability Maturity Model Integration (CMMI) method: is a process improvement approach that contains 22 process areas. -It is divided into appraisal, evaluation, and structure. -particularly well suited to organizations that need help with application development, life cycle issues, and improving the delivery of products throughout the life cycle.

Using a Relational Database for Business Advantages:

-INCREASED FLEXIBILITY -INCREASED SCALABILITY AND PERFORMANCE -REDUCED DATA REDUNDANCY -INCREASED DATA INTEGRITY (QUALITY) -INCREASED DATA SECURITY

The four primary reasons for low-quality data are:

-Online customers intentionally enter inaccurate data to protect their privacy. -Different systems have different data entry standards and formats. -Data-entry personnel enters abbreviated data to save time or erroneous data by accident. -Third-party and external data contains inconsistencies, inaccuracies, and errors.

Rule 41: is the part of the U.S. Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence

-Rule 41 originally granted a federal magistrate judge the authority to issue a warrant to search and seize a person or property located within that judge's district if the person or property is part of a criminal investigation or trial. -In April 2016, the Judicial Conference of the United States proposed an amendment to Rule 41 that allows a federal magistrate judge to issue a warrant that allows an investigator to gain remote access to a digital device suspected in a crime, even if the device is located outside of the geographic jurisdiction of the judge issuing the warrant

INCREASED DATA INTEGRITY (QUALITY):

-data integrity -integrity constraints -business rule -business-critical integrity constraints

transactional data:

-encompasses all of the data contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks. -Organizations need to capture and store transactional data to perform operational tasks and repetitive decisions such as analyzing daily sales reports and production schedules to determine how much inventory to carry.

Information ethics

-govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies) -Ethical dilemmas in this area usually arise not as simple, clear-cut situations but as clashes among competing goals, responsibilities, and loyalties. Inevitably, there will be more than one socially acceptable or correct decision. -The protection of customers' privacy is one of the largest and murkiest ethical issues facing organizations today.

Copyright

-is the legal protection afforded an expression of an idea, such as a song, book, or video game. -As it becomes easier for people to copy everything from words and data to music and video, the ethical issues surrounding copyright infringement and the violation of intellectual property rights are consuming the ebusiness world.

INCREASED FLEXIBILITY:

-physical view of data: deals with the physical storage of data on a storage device. -logical view of data: focuses on how individual users logically access data to meet their own particular business needs. -while a database has only one physical view, it can easily support multiple logical views that provide for flexibility.

What is the relationship between adware and spyware?

Adware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user. Spyware is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

What are ethics and why are they important to a company?

As it becomes easier for people to copy everything from words and data to music and video, the ethical issues surrounding copyright infringement and the violation of intellectual property rights are consuming the ebusiness world. Technology poses new challenges for our ethics — the principles and standards that guide our behavior toward other people.

Emergency communications:

CISA enhances public safety interoperable communications at all levels of government, providing training, coordination, tools, and guidance to help partners across the country develop their emergency communications capabilities. Working with stakeholders across the country, CISA conducts extensive, nationwide outreach to support and promote the ability of emergency response providers and relevant government officials to continue to communicate in the event of natural disasters, acts of terrorism, and other human-made disasters.

CISA duties:

CISA is responsible for protecting the nation's critical infrastructure from physical and cyber threats. This mission requires effective coordination and collaboration among a broad spectrum of government and private-sector organizations.

Comprehensive cyberprotection:

CISA's National Cybersecurity and Communications Integration Center (NCCIC) provides 24/7 cyber situational awareness, analysis, incident response, and cyber defense capabilities to the federal government; state, local, tribal, and territorial governments; the private sector; and international partners.

What are the costs associated with downtime?

Costs from downtime include revenue losses, damaged reputation, and poor performance.

Four primary traits that help determine data's value:

Data type, data timeliness, data quality, and data governance

What are the reasons a company experiences downtime?

Downtime can occur for many number of reasons from fires, floods, tornados, sinks overflowing, and mice easting the power wires.

Cybersecurity incident response

How much time and energy should be spent investigating a breach? What is an appropriate level of incident detail to share with customers and other stakeholders? How thick is the line between satisfying organizational obligations and finding the complete truth behind an incident?

Research

How should researchers balance the use of potentially aggressive penetration testing techniques against the legal rights of the owners of systems they are researching? Does that balance change in cases in which those system owners are not implementing reasonably strong security methods?

Infrastructure resilience:

Infrastructure resilience: CISA coordinates security and resilience efforts using trusted partnerships across the private and public sectors and delivers training, technical assistance, and assessments to federal stakeholders as well as to infrastructure owners and operators nationwide. CISA provides consolidated all-hazards risk analysis for U.S. critical infrastructure through the National Risk Management Center.

What is the difference between pirated software and counterfeit software?

Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software. Counterfeit software is software that is manufactured to look like the real thing and sold as such.

Data type:

The two primary types of data are transactional and analytical

Sale restrictions

What (if any) is the responsibility of cybersecurity professionals to try to prevent the sale of products they have developed to autocratic governments that would use them to harm their citizens.

Role of CSO (Chief Security Officer)

What kinds of personal risk should a chief security officer or manager-level security officer accept on behalf of an organization? It is not uncommon for CSOs to be fired or forced out when a cybersecurity breach occurs; should organizations offer CSOs employment agreements that include provisions for relief from personal legal liability or other protections? How should organizational deficiencies (underinvestment, bad practices, etc.) factor in this analysis?

Encryption

What should companies do in response to legal law enforcement requests for encrypted data? Should known vulnerabilities in systems be used to comply with requests that would otherwise be impossible? Should law enforcement agencies use such vulnerabilities themselves if they suspect a formal legal request will not bear fruit?

data gap analysis occurs when

a company examines its data to determine if it can meet business expectations while identifying possible data gaps or where data might be missing.

a relational database management system

allows users to create, read, update, and delete data in a relational database.

Hackers:

are experts in technology who use their own knowledge to break into computers and networks, either for profit or simply for the challenge

data models:

are logical data structures that detail the relationships among data elements using graphics or pictures.

cyberattacks

are malicious attempts to access or damage a computer system with attributes such as: -Use computers, mobile phones, gaming systems, and other devices. -Include identity theft. -Block your access or delete your personal documents and pictures. -Target children. -Cause problems with business services, transportation, and power.

Botnets:

are malware that causes a collection of connected devices to be controlled by a hacker

relational integrity constraints:

are rules that enforce basic and fundamental information-based constraints.

integrity constraints:

are rules that help ensure the quality of data.

data dictionary:

compiles all of the metadata about the data elements in the data model

database management system (DBMS):

creates, reads, updates, and deletes data in a database while controlling access and security.

data granularity:

data granularity: refers to the extent of detail within the data (fine and detailed or coarse and abstract).

Data quality:

data inconsistency and data integrity

INCREASED SCALABILITY AND PERFORMANCE:

data latency: is the time it takes for data to be stored or retrieved

REDUCED DATA REDUNDANCY:

data redundancy: is the duplication of data, or the storage of the same data in multiple places.

business rule:

defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer.

Metadata:

details about data

analytical data:

encompasses all organizational data, and its primary purpose is to support the performing of managerial analysis tasks. -Analytical data is useful when making important decisions such as whether the organization should build a new manufacturing plant or hire additional sales personnel.

INCREASED DATA SECURITY:

identity management: is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.

Cybersecurity

involves prevention, detection, and response to cyberattacks that can have a wide range of effects on the individual, organization, community, and at the national level

Information security

is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside the organization primary tool an organization can use to combat the threats associated with downtime

Drive-by hacking:

is a computer attack by which an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network

primary key

is a field (or group of fields) that uniquely identifies a given record in a table.

data integrity:

is a measure of the quality of data

data integrity

is a measure of the quality of data. -five characteristics common to high-quality data: accuracy, completeness, consistency, timeliness, and uniqueness.

ethical hacker:

is a person who hacks into a computer system to find vulnerabilities to help a company test its security

foreign key

is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

control objectives for information and related technologies (COBIT)

is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.

Information Systems Audit and Control Association (ISACA)

is a set of guidelines and supporting tools for IT governance that is accepted worldwide and generally used by auditors and companies as a way to integrate technology to implement controls and meet specific business objectives.

Spyware:

is a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission

Digital right management

is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Database:

maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

Scareware:

is a type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software. Scareware often takes advantage of vulnerabilities in a computer's browser to generate pop-ups that resemble system error messages. -The warnings, which are designed to look authentic, typically alert the user that a large number of infected files have been found on the computing device. The user is then prompted to call a phone number or click on a hyperlink to get the infection cleaned up. If the user calls the phone number, they are urged to share credit card information in order to make a purchase for bogus software or are sent to a website to download a "clean up" software application that actually contains malware and infects the computer. If the user falls for the scam, they will not only lose the money they paid for the useless software, they may also make their computer unusable.

Patent

is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor

Intellectual property:

is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents

Committee of Sponsoring Organizations (COSO)

is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting. This is a more business-general framework that is less technically specific.

data steward:

is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business

Malware:

is software intended to damage or disable computers or systems

adware:

is software that although purporting to serve some useful function and often fulfilling that function also allows internet advertisers to displays ads without consent of the computer user

Counterfeit software

is software that is manufactured to look like the real thing and sold as such

Virus:

is software written with malicious intent to cause annoyance or damage

Confidentiality

is the assurance that messages and information remain available only to those authorized to view them.

data stewardship

is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner

Digital trusts

is the measure of consumer, partner, and employee confidence in an organizations ability to protect and secure data and the privacy of individuals

master data management:

is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems.

Privacy

is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.

data element (or data field):

is the smallest or basic unit of data

Pirated software

is the unauthorized use, duplication, distribution, or sale of copyrighted software

The ability to understand, digest, analyze, and filter data is

key to growth and success for any professional in any industry.

data inconsistency:

occurs when the same data element has different values -Take, for example, the amount of work that needs to occur to update a customer who had changed her last name due to marriage. Changing this data in only a few organizational systems will lead to data inconsistencies, causing customer 123456 to be associated with two last names.

bug bounty program

or vulnerability rewards programs is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs

real-time system:

provide real-time information in response to requests. -The growing demand for real-time data stems from organizations' need to make faster and more effective decisions, keep smaller inventories, operate more efficiently, and track performance more carefully.

There are two primary tools available for retrieving data from a DBMS

query-by-example (QBE) tool & structured query language

Data timeliness:

real-time data and real-time systems

down time

refers to a period of time when a system is unavailable

E-discovery: (electronic discovery)

refers to the ability of a company to identify, search, gather, seize or export digital information in responding to litigation, audit, investigation, or information inquiry.

data governance:

refers to the overall management of the availability, usability, integrity, and security of company data. -Data governance focuses on enterprise wide policies and procedures, whereas data stewardship focuses on the strategic implementation of the policies and procedures.

worm

spreads itself not only from file to file but also from computer to computer -The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers.

relational database model:

stores data in the form of logically related, two-dimensional tables

structured query language

that asks users to write lines of code to answer questions against a database.

query-by-example (QBE) tool

that helps users graphically design the answer to a question against a database.

Ethics

the principles and standards that guide our behavior toward other people

data validation includes

the tests and evaluations used to determine compliance with data governance policies to ensure correctness of data.

Child online protection act (COPA)

was passed to protect minors from accessing inappropriate material on the internet.

Cybersecurity and Infrastructure Security Agency (CISA)

which builds the national capacity to defend against cyberattacks and works with the federal government to provide cybersecurity tools, incident response services, and assessment capabilities to safeguard the ".gov" networks that support the essential operations of partner departments and agencies.


Related study sets

Testbank Questions: Managing Digital Media

View Set

Module 3 - Vocabulary Builder (Home) - part 1

View Set

Chapter 8: Documenting Systems and Processes

View Set

Problem Solving: What is a problem

View Set

Español 3 - El Internado - Repaso para el Examen sobre las Temporadas 1 y 2

View Set

Gender, Sex, and Sexuality (Ch. 12)

View Set