Risks Associated With Information Technologies
Computer and Network Security: Basic Safegaurds
Security Threats
Security Measures and Enforcement
Random!
100
Software that secretly gathers information about users while they browse the web
What is Spyware?
100
When a system must prevent disclosing information to anyone who is not authorized to access it
What is Confidentiality?
100
Viruses, worms, trojan programs, logic bombs, backdoors, blended threats, rootkits, denial-of-service attacks, and social engineering
What are Intentional threats?
100
Facial recognition, finger prints, hand geometry, iris analysis, retinal scanning and palm prints
What are biometric security measures?
100
Memory sticks, CDs, USB flashdrives, and smartphones
What are some current inventions that propose risks to organizations data resources?
200
A form of spyware that collects information about the user to determine what ads to show them while they browse the internet
What is adware?
200
The accuracy of information resources within an organization
What is Integrity?
200
These types of engineers search through dumpsters or trash cans looking for discarded material (phone lists and bank statements) that they can use to help break into a network
What are social engineers?
200
A combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks
What is a firewall?
200
A programming routine built into a system that enables the programmer to bypass the system security and sneak back into the system later to access information
What is a backdoor?
300
Sending fraudulent emails that seem to come from a credible source for the purpose of capturing sensitive information
What is Phishing?
300
When computers and networks are operating, and authorized users can access the information they need. It also refers to the quick recovery in the event of a system failure!
What is Availability?
300
The cost of (????) to the global economy is $1 trillion!!
What is the cost of cybercrime?
300
Antivirus and spyware, operating systems, and email security features are....
What are ways to ensure security of data?
300
This system must provide these levels of security: (1) Front-end servers are those who are available to both internal and external users (2) Back-end systems must be protected to ensure confidentiality, accuracy and integrity of data (3) the corporate network must be protected against intrusion and unauthorized access.
What is a comprehensive security system?
400
An attempt to gain access to a network by posing as an authorized user
What is Spoofing?
400
Three types of hackers include (1) inexperienced ones who use other peoples programs to hack, (2) those who specialize in unauthorized penetration of information systems and (3) ethical hackers who ensure safety of a company's information systems.
What are script kiddies, black hats, and white hats?
400
These two internal threats differ because one of them is an independent program that can spread itself without having to be attached to a host while the other internal threat must be triggered by using a particular program or operating system and then attaches itself
What is the difference between a worm and a virus?
400
Protects against both external and internal access. Usually placed in front of a firewall and can identify and attack signatures among many other capabilities.
What is an intrusion detection system?
400
Capturing and recording network traffic
What is sniffing?
500
The unauthorized use of computer data for personal gain
What is computer fraud
500
Ensures availability in the event of a system failure by using a combination of hardware and software.
What are fault-tolerant systems?
500
Contains a code intended to disrupt a computer, network, or Website and it is usually hidden inside a popular program. When users run this program, they are unaware they are running the malicious program in the background.
What is a trojan program?
500
A software that acts as an intermediary between two systems (ie. between network users and the internet)
What is a proxy server?
500
This model helps designers of security systems consider many crucial issues for improving the effectiveness of security measures. It highlights different states of information: transaction, storage, and processing
What is the McCumber cube?