• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back

access controls

controls that restrict unauthorized individuals from using information resources and are concerned with user identification

adware

Alien software designed to help pop-up advertisements appear on your screen

alien software

clandestine software that is installed on yur computer through duplicitous methods.

Anti-malware systems

software packages that attempt to identify and eliminate virues, worms, and other malicious software

audit

an examination of information systems, their inputs, outputs, and processing

authentication

a process that determines the identity of the person requiring acces

authorzaation

a process that determines which actions, rights, or privileges the person has, based on verified identiy

back door

typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures.

biometrics

the science and technology of authentication by measuring the subject's physiologic or behavioral characteristics

blacklisting

a process in which a company identifies certain types of software that re not allowed to run in the company environment.

certificate authority

a third party that acts as trusted intermediary between computers by issuing digital certificates and verifying the worth and integrity of the certificates

cold site

a backup location that provides only rudimentary services and facilities

communications controls

controls that deal with the movement of data across networks

controls

defense mechanisms

cookie

small amounts of information that web sites store on your computer, temporarily or more or less permanently.

copyright

A grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the lif of the creator plus 70 year

cybercrime

illegal activities executed on the internet

cyberterrorism

can be defined as a premeditated,politically motivated attack against informatin, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents

cyberwafare

war in which a country's information systems could be paralyzed from a massive attack by destruction software

demilitarized zone

a separate organizational local area network that is located between an organization's internal network and an external network, usually the internet

denial-of-service attack

a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources

digital certificate

an electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content

distributed denial-of-service attack

a denial-of-service attack that sends a flood of data packets from many compromised computers simltaneously.

employee monitoring systems

systems that monitor emplyees computers, e-mail activites, and internet surfing activities

eneryption

the process of converting an riginal message into a form that cannot be read by anyone except the intended receiver

exposure

the harm, loss, or damage that can result if a threat compromises an information resource

FIREWALL

A SYSTEM THAT PREVENTS A SPECIFIC TYPE OF INFORMATION FROM MOVING BETWEEN UNTRUSTED NETWORKS, SUCH AS THE iNTERNET, and private networks, such as your company's network

hot sites

a fully configured computer facility, with all information resources and services, communictions links, and physical plant operations, that duplicates your company's computing resources and provides near real-time recovery of IT operations.

idendtity theft

crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud

information security

protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

intellectual property

the intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws.

least privilege

a principe that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization

logic bombs

segments of computer code embedded within an organization's existing computer programs

malware

malicious software such as viruses and worms.

password

a private combination of characters that only the user should know

patent

a document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years

phishing attack

an attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail

physical controls

controls that restrict unauthorized individuals from gaining access to a company's computer facilities

pirate

copying a software program without making payment to the owner

privacy

the right to be left alone and to be free of unreasonable personal intrusion

privilege

a collection of related computer system operations that can be performed by users of the system

risk

the likelihood that a threat will occur

secure socket layer

an encrption standard used for secure transactions such as credit card purchases and online banking

security

the degree of protection against criminal activity, danger, damage,or loss

spam

unsolicited e-mail

threat

any danger to which an information resource may be exposed

trade secret

Intellectual work, such as a business plan, that is a company secret and is not based on public informaion

Trojan horse

a software program containing a hidden function that presents a security risk

viruses

malicious software that can attach itself to other computer programs without the owner of the program being aware of the infection.

worms

Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication