Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
41 Cards in this Set
- Front
- Back
Name 4 reasons why we should have information security (4 predators) |
1. Viruses 2. Web Defacements 3. Worms 4. Password Crackers |
|
What does CIA stand for in information security? |
Confidentiality -Protecting information from unauthorized disclosure
Integrity -Protecting information from unauthorized alteration / destruction
Availability -Ensuring the availability and access to the information |
|
Definition of security policy |
Documented Security Principles |
|
name 5 "security basics" that help keep sound security. |
1. Security Policy 2. Educate users - security awareness 3. Physical Security 4. Monitor Network, review logs 5. Passwords |
|
Name two functions of the firewall |
1. Examines network packets entering/leaving an organization 2. Determine whether packets are allowed to travel 'through' the firewall. |
|
What is the Intrusion detection system prevention system (IDS / IPS)? |
1. Features full-time monitoring tools that search for patterns in network traffic to identify intruders 2. Protects against suspicious network traffic 3. attempts to access files and data
|
|
Name two functions of "Operational Controls" |
Investigates error messages, reports, alarms
|
|
why use encryption? (4) |
1. disguising message 2. confidentiality 3. non-repudiation - sender cannot deny they sent message 4.C,I,A |
|
what is steganography? |
hiding information in a picture / video / audio file |
|
what is a Symmetric / Secret Key (look up in book) |
A same key that's used for encryption and decryption |
|
Asymmetric (private/public) key |
When there are two different keys: private key is used for decryption (user), and a public key is used for encryption (distribution) |
|
What is a hash Function? Name some examples |
Any function that can be used to map digital data of arbitrary size.
MD5 - 128 Bit Hash |
|
Facts on conversion methods - parallel |
1. Using both the new and old system at the same time 2. If the new system fails, then we can stop the new, and the old system can keep on going.
|
|
facts on conversion methods- pilot |
1. use a demo group that will use the new system. 2. Can take time to fix bugs. Demo group can be used as the guinea pigs. |
|
What will the IDS do if a suspicious event or unauthorized traffic is identified? |
IDS will generate an alarm, and can be customized to shut down a particularly sensitive part of the network. |
|
Describe the process of a digital signature (5) |
1. Hash algorithm creates a unique abstract of the message. 2.Hash function goes through the message digest 3. Private Key of Sender encrypts digest. 4. Encrypted digest becomes digital signature 5. when then the message digital signature appears. |
|
Name three features of digital signatures |
1. integrity - message not changed 2. Creates non-repudiation 3. Used to authenticate software, data, images,. 4. Verifies sender identity |
|
What are biometrics? |
Multi-factor authentication in which you can identify people by measuring some aspect of individual anatomy, physiology, some deeply ingrained skill, or other behavioral characteristic. |
|
What is a false positive? |
a client is accepted as authenticated when they should have been rejected. |
|
What is a false negative |
a client is rejected as NOT authenticated when in fact they should have been accepted. |
|
list all of the components in the system development life cycle (waterfall approach |
investigation phase Analysis phase Design phase implementation phase maintenance phase I - in A - ass D - dick I - is M - massive |
|
What report needs to be typed when in the investigation phase? |
feasibility report |
|
During the investigation phase, you conduct a preliminary study to determine _____ (3 things) |
estimated costs general information system needs What the new system should include / exclude
|
|
What do you do in the analysis phase? (2) |
1. Examine current system 2. Requirements report |
|
Name some features of the design phase (2) |
1. "how" question is answered 2. more technical phase
|
|
Name some features of the implementation phase:(2) |
1. Building/buying and delivering the actual system. 2. activities such as testing, conversion, training |
|
Name some features of the maintenance phase: (2) |
1. ongoing 2. monitoring, updating 3. takes more time and resources than anticipated |
|
name some characteristics of agile development / scrum projects: (2) |
1. make progress in a series of 2-4 week long "sprints" 2. product componet is: designed, coded, and tested during sprint
|
|
Name 3 IS Project Success Factors |
1. USer involvement 2. clear statement of requirement 3. proper planning |
|
What does EFT stand for? |
Electronic Funds Transfer |
|
What does EDI stand for |
Electronic Data Interchange |
|
Name three factors affecting retailing the web |
performance and service personalization socialization |
|
What types of management are required in E-Commerce Process components |
Search Conent Catalog Workflow |
|
Name 3 functions of Decision Support Systems |
1. Information Reporting versus decision-making. 2. Seek out goals, and optimization. 3. use models, and specialized databases. |
|
Name 3 areas of Artificial Intelligence |
1. Intelligent Agents 2. Expert Systems |
|
Definition: a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users. |
Intelligent Agents |
|
this is known as the "sherlock holmes for an information search agent |
intelligent agents |
|
List the process of expert systems (4) |
1. knowledge base 2. inference engine program 3. user interface programs 4. expert advice |
|
Name 3 things that are being outsourced: |
1. programming 2. data entry 3. help desk operations |
|
Name 3 weaknesses of outsourcing |
1. Job loss threat 2. loss of intellectual properties 3. Loss of control of IT function |
|
What are 2 difficulties of outsourcing? |
1. Cultural barriers 2. Legal Differences 3. Time and distance costs |