• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/41

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

41 Cards in this Set

  • Front
  • Back

Name 4 reasons why we should have information security (4 predators)

1. Viruses


2. Web Defacements


3. Worms


4. Password Crackers

What does CIA stand for in information security?

Confidentiality -Protecting information from unauthorized disclosure



Integrity -Protecting information from unauthorized alteration / destruction



Availability -Ensuring the availability and access to the information

Definition of security policy

Documented Security Principles

name 5 "security basics" that help keep sound security.

1. Security Policy


2. Educate users - security awareness


3. Physical Security


4. Monitor Network, review logs


5. Passwords

Name two functions of the firewall

1. Examines network packets entering/leaving an organization


2. Determine whether packets are allowed to travel 'through' the firewall.

What is the Intrusion detection system prevention system (IDS / IPS)?

1. Features full-time monitoring tools that search for patterns in network traffic to identify intruders


2. Protects against suspicious network traffic


3. attempts to access files and data


Name two functions of "Operational Controls"



Investigates error messages, reports, alarms





why use encryption? (4)

1. disguising message


2. confidentiality


3. non-repudiation - sender cannot deny they sent message


4.C,I,A

what is steganography?

hiding information in a picture / video / audio file

what is a Symmetric / Secret Key (look up in book)

A same key that's used for encryption and decryption

Asymmetric (private/public) key

When there are two different keys: private key is used for decryption (user), and a public key is used for encryption (distribution)

What is a hash Function? Name some examples

Any function that can be used to map digital data of arbitrary size.



MD5 - 128 Bit Hash

Facts on conversion methods - parallel

1. Using both the new and old system at the same time


2. If the new system fails, then we can stop the new, and the old system can keep on going.


facts on conversion methods- pilot

1. use a demo group that will use the new system.


2. Can take time to fix bugs. Demo group can be used as the guinea pigs.

What will the IDS do if a suspicious event or unauthorized traffic is identified?

IDS will generate an alarm, and can be customized to shut down a particularly sensitive part of the network.

Describe the process of a digital signature (5)

1. Hash algorithm creates a unique abstract of the message.


2.Hash function goes through the message digest


3. Private Key of Sender encrypts digest.


4. Encrypted digest becomes digital signature


5. when then the message digital signature appears.

Name three features of digital signatures

1. integrity - message not changed


2. Creates non-repudiation


3. Used to authenticate software, data, images,. 4. Verifies sender identity

What are biometrics?

Multi-factor authentication in which you can identify people by measuring some aspect of individual anatomy, physiology, some deeply ingrained skill, or other behavioral characteristic.

What is a false positive?

a client is accepted as authenticated when they should have been rejected.

What is a false negative

a client is rejected as NOT authenticated when in fact they should have been accepted.

list all of the components in the system development life cycle (waterfall approach

investigation phase


Analysis phase


Design phase


implementation phase


maintenance phase


I - in


A - ass


D - dick


I - is


M - massive

What report needs to be typed when in the investigation phase?

feasibility report

During the investigation phase, you conduct a preliminary study to determine _____ (3 things)

estimated costs


general information system needs


What the new system should include / exclude


What do you do in the analysis phase? (2)

1. Examine current system


2. Requirements report

Name some features of the design phase (2)

1. "how" question is answered


2. more technical phase


Name some features of the implementation phase:(2)

1. Building/buying and delivering the actual system.


2. activities such as testing, conversion, training

Name some features of the maintenance phase: (2)

1. ongoing


2. monitoring, updating


3. takes more time and resources than anticipated

name some characteristics of agile development / scrum projects: (2)

1. make progress in a series of 2-4 week long "sprints"


2. product componet is: designed, coded, and tested during sprint


Name 3 IS Project Success Factors

1. USer involvement


2. clear statement of requirement


3. proper planning

What does EFT stand for?

Electronic Funds Transfer

What does EDI stand for

Electronic Data Interchange

Name three factors affecting retailing the web

performance and service


personalization


socialization

What types of management are required in E-Commerce Process components

Search


Conent


Catalog


Workflow

Name 3 functions of Decision Support Systems

1. Information Reporting versus decision-making.


2. Seek out goals, and optimization.


3. use models, and specialized databases.

Name 3 areas of Artificial Intelligence

1. Intelligent Agents


2. Expert Systems

Definition: a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users.

Intelligent Agents

this is known as the "sherlock holmes for an information search agent

intelligent agents

List the process of expert systems (4)

1. knowledge base


2. inference engine program


3. user interface programs


4. expert advice

Name 3 things that are being outsourced:

1. programming


2. data entry


3. help desk operations

Name 3 weaknesses of outsourcing

1. Job loss threat


2. loss of intellectual properties


3. Loss of control of IT function

What are 2 difficulties of outsourcing?

1. Cultural barriers


2. Legal Differences


3. Time and distance costs