Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
access controls |
controls that restrict unauthorized individuals from using information resources and are concerned with user identification |
|
adware |
Alien software designed to help pop-up advertisements appear on your screen |
|
alien software |
clandestine software that is installed on yur computer through duplicitous methods. |
|
Anti-malware systems |
software packages that attempt to identify and eliminate virues, worms, and other malicious software |
|
audit |
an examination of information systems, their inputs, outputs, and processing |
|
authentication |
a process that determines the identity of the person requiring acces |
|
authorzaation |
a process that determines which actions, rights, or privileges the person has, based on verified identiy |
|
back door |
typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures. |
|
biometrics |
the science and technology of authentication by measuring the subject's physiologic or behavioral characteristics |
|
blacklisting |
a process in which a company identifies certain types of software that re not allowed to run in the company environment. |
|
certificate authority |
a third party that acts as trusted intermediary between computers by issuing digital certificates and verifying the worth and integrity of the certificates |
|
cold site |
a backup location that provides only rudimentary services and facilities |
|
communications controls |
controls that deal with the movement of data across networks |
|
controls |
defense mechanisms |
|
cookie |
small amounts of information that web sites store on your computer, temporarily or more or less permanently. |
|
copyright |
A grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the lif of the creator plus 70 year |
|
cybercrime |
illegal activities executed on the internet |
|
cyberterrorism |
can be defined as a premeditated,politically motivated attack against informatin, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents |
|
cyberwafare |
war in which a country's information systems could be paralyzed from a massive attack by destruction software |
|
demilitarized zone |
a separate organizational local area network that is located between an organization's internal network and an external network, usually the internet |
|
denial-of-service attack |
a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources |
|
digital certificate |
an electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content |
|
distributed denial-of-service attack |
a denial-of-service attack that sends a flood of data packets from many compromised computers simltaneously. |
|
employee monitoring systems |
systems that monitor emplyees computers, e-mail activites, and internet surfing activities |
|
eneryption |
the process of converting an riginal message into a form that cannot be read by anyone except the intended receiver |
|
exposure |
the harm, loss, or damage that can result if a threat compromises an information resource |
|
FIREWALL |
A SYSTEM THAT PREVENTS A SPECIFIC TYPE OF INFORMATION FROM MOVING BETWEEN UNTRUSTED NETWORKS, SUCH AS THE iNTERNET, and private networks, such as your company's network |
|
hot sites |
a fully configured computer facility, with all information resources and services, communictions links, and physical plant operations, that duplicates your company's computing resources and provides near real-time recovery of IT operations. |
|
idendtity theft |
crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud |
|
information security |
protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. |
|
intellectual property |
the intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws. |
|
least privilege |
a principe that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization |
|
logic bombs |
segments of computer code embedded within an organization's existing computer programs |
|
malware |
malicious software such as viruses and worms. |
|
password |
a private combination of characters that only the user should know |
|
patent |
a document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years |
|
phishing attack |
an attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail |
|
physical controls |
controls that restrict unauthorized individuals from gaining access to a company's computer facilities |
|
pirate |
copying a software program without making payment to the owner |
|
privacy |
the right to be left alone and to be free of unreasonable personal intrusion |
|
privilege |
a collection of related computer system operations that can be performed by users of the system |
|
risk |
the likelihood that a threat will occur |
|
secure socket layer |
an encrption standard used for secure transactions such as credit card purchases and online banking |
|
security |
the degree of protection against criminal activity, danger, damage,or loss |
|
spam |
unsolicited e-mail |
|
threat |
any danger to which an information resource may be exposed |
|
trade secret |
Intellectual work, such as a business plan, that is a company secret and is not based on public informaion |
|
Trojan horse |
a software program containing a hidden function that presents a security risk |
|
viruses |
malicious software that can attach itself to other computer programs without the owner of the program being aware of the infection. |
|
worms |
Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication |