• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
Insiders
-legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
Social Engineering
-using one's social skills to trick people into revealing access credentials or other valuable information
Steps for Creating an Information Security Plan
1. Develop policies
2.Communicate the policies
3. Identify critical information assets and risks
4.Test and reevaluate
5. Obtain stake holder support
First Line of Defense
-people
Second Line of Defense
-technology
Authentication
-second line of defense
-method for confirming users' identities
Authorization
-second line of defense
-process of giving someone permission to do or have something
Identity Theft
-forging of someone's identity for the purpose of fraud
Phishing
-technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email
Tokens
-small electronic devices that change user passwords automatically
Smart Card
-card that can store information or software
-can be used for identification, cash or data storage
Biometrics
-identification of a user based on a physical characteristic
Content Filtering
-when organizations use software that filters content to prevent the transmission of unauthorized information
Public Key Encryption
-an encryption system that used to keys: a public key that everyone can have and private key for only the recipient
Firewall
-a hardware and or software that guards a private network by analyzing the information leaving and entering the network
Security Threats to Ebusiness
1.elevation of privilege- hacker gets into a system through guest account then gains administrative privileges
2. hoaxes- masking the attack in a seemingly legitimate message
3. malicious code- viruses, worms and Trojan horses
4. spoofing- forging of return address on an email so that the message appears to come from someone other than the actual sender
5.spyware
6.sniffer- program that can montier data traveling over a network