Chapter 7
Chapter 8
Chapter 9
Chapter 12
Chapter 12: Security Threats
100
Another name for itemized bill
What is an invoice?
100
The exchange of goods or services for money
What is sale
100
Shared directories of shared documents
What is a library
100
Verifies the credentials of the individual seeking access to a computer resource
What is authentication
100
Occurs when an intruder uses another site’s IP address to masquerade as that other site
IP spoofing
200
Time required for a supplier to deliver an order
What is lead time
200
Administration of customer-facing processes and managing all the interactions with customers
What is customer relationship management (CRM)
200
Data that is used to manage the project such as schedules, tasks, and budgets
What is project metadata
200
Someone who is well versed in the Porter models, organizational strategy, and systems alignment theory such as COBIT and who also understands the proper role for technology
What is a business analyst
200
Technique for obtaining authorized data that uses pretexting via email
What is phishing
300
To summarize the accounting transactions into balance sheets and income statements
What is roll up
300
A multi-firm process of buying and selling goods and services using Internet technologies
What is E-commerce
300
Process of applying principles and techniques for planning, organizing, and monitoring temporary endeavors.
What is project management
300
New system/business process runs with with the old one until the new system is tested and fully operational
What is parallel installation
300
A weakness in the IS that provides an opportunity for threats to gain access to individual or organizational assets
What is a vulnerability
400
The relationship between invoice, purchase order, and receipt for goods
What is a three-way match
400
IS that supports the Sales process of B2C companies that customers use to enter and manage their orders
What is a web storefront
400
Sequence of activities by which original content is created and subsequently acted upon by others within the organization
What is workflow
400
Formal description of the system’s response to use and misuse scenarios
What is a test plan
400
Process of preventing the unauthorized access to an IS or modification of its data
What is information systems security
500
This occurs when companies order more supplies than are needed due to a sudden change in demand
What is a bottleneck
500
This shows that legal ownership of the material has changed
What is a posting
500
Process of using a product or idea that you develop or promote
What is dogfooding
500
Process of transforming clear text into coded, unintelligible text for secure storage or communication
What is encryption
500
A technique used by criminals to infect target machines with a virus, keyboard logger, or other malicious code
What is cross-site scripting (XSS)