ITM 100 Class 9: Securing Information Systems
48 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of a firewall?

  • To prevent unauthorized access to networks (correct)
  • To encrypt sensitive data
  • To monitor internal network traffic
  • To detect malware on devices

Which of the following best describes an intrusion detection system?

  • Hardware that stores backup data
  • A system that monitors networks for unauthorized access (correct)
  • Software that repairs damaged files
  • A tool that encrypts data for secure transmission

What is the role of antivirus and antispyware software?

  • To prevent physical damage to computers
  • To manage network traffic
  • To backup data in case of loss
  • To check for and eliminate malware (correct)

What does encryption do to plaintext?

<p>Transforms it into ciphertext (B)</p> Signup and view all the answers

Which process is the reverse of encryption?

<p>Decryption (B)</p> Signup and view all the answers

Why is continual updating important for antivirus and antispyware software?

<p>To keep up with emerging threats (A)</p> Signup and view all the answers

What field of study refers to encoded information?

<p>Cryptography (D)</p> Signup and view all the answers

Which statement correctly describes ciphertext?

<p>It is the result of the encryption process. (A)</p> Signup and view all the answers

What best describes computer crime?

<p>A violation of criminal law that involves technology for various purposes. (B)</p> Signup and view all the answers

Which of the following represents a way in which computers can be the target of crime?

<p>Accessing a system without authority. (B)</p> Signup and view all the answers

What is a primary challenge regarding wireless security?

<p>Scanning of radio frequency bands. (C)</p> Signup and view all the answers

What does 'war driving' refer to in the context of wireless security?

<p>Driving by locations to detect wireless networks. (D)</p> Signup and view all the answers

Which of the following is a common internet vulnerability?

<p>Interception of network communications. (B)</p> Signup and view all the answers

What is one potential risk of using email for communication?

<p>Attachments may contain malware. (B)</p> Signup and view all the answers

Why are fixed Internet addresses considered vulnerable?

<p>They provide a consistent target for hackers. (A)</p> Signup and view all the answers

Which of the following is NOT a method through which computers can be used as instruments of crime?

<p>Utilizing social media for promotions. (B)</p> Signup and view all the answers

What is the expected annual loss due to user error, based on the data provided?

<p>$19,698 (B)</p> Signup and view all the answers

What is the probability of occurrence for power failure?

<p>30 (A)</p> Signup and view all the answers

Which of the following is a focus of business continuity planning?

<p>Restoring business operations after a disaster (C)</p> Signup and view all the answers

Which risk has the highest expected annual loss according to the data presented?

<p>Power failure (A)</p> Signup and view all the answers

Which type of analysis is crucial in both disaster recovery planning and business continuity planning?

<p>Business impact analysis (C)</p> Signup and view all the answers

What role does identity management play in security policy?

<p>It helps in identifying valid users and controlling access. (C)</p> Signup and view all the answers

Based on the information given, which statement about embezzlement is true?

<p>The expected annual loss is $1,275. (C)</p> Signup and view all the answers

Which method is NOT considered a type of biometric authentication?

<p>Smart cards (D)</p> Signup and view all the answers

Why is it important for management to determine which systems to restore first?

<p>To identify the firm's most critical systems. (D)</p> Signup and view all the answers

What is a key guideline for creating a secure password?

<p>Include a mix of uppercase letters, lowercase letters, digits and special characters (A)</p> Signup and view all the answers

Which of the following is an example of two-factor authentication?

<p>Entering a password followed by a verification code sent to your phone (A)</p> Signup and view all the answers

What is a potential risk of biometric authentication like fingerprint analysis?

<p>User characteristics can be easily replicated or stolen (A)</p> Signup and view all the answers

Which practice should be avoided to maintain password security?

<p>Telling friends about passwords for convenience (C)</p> Signup and view all the answers

What characteristic makes a password easier to remember yet harder to guess?

<p>A combination of uppercase letters, lowercase letters, digits, and special characters (B)</p> Signup and view all the answers

Why should a user not leave their computer logged in when away?

<p>It increases the risk of unauthorized access (C)</p> Signup and view all the answers

What is a fundamental reason for using a smart card in authentication?

<p>It contains an embedded memory chip for secure identification (D)</p> Signup and view all the answers

What is the primary purpose of general controls in information systems?

<p>To govern the design, security, and use of computer programs (D)</p> Signup and view all the answers

Which of the following describes application controls?

<p>Controls that are unique to each computerized application (D)</p> Signup and view all the answers

What aspect does the CIA Triad primarily focus on?

<p>Ensuring data confidentiality, integrity, and availability (A)</p> Signup and view all the answers

What is the role of identity management software in information security?

<p>To authenticate users and manage access controls (A)</p> Signup and view all the answers

Which of the following best describes software patches?

<p>Small updates that repair flaws in software (D)</p> Signup and view all the answers

What is the main challenge associated with software patches?

<p>Exploits are often developed faster than patches can be rolled out (C)</p> Signup and view all the answers

Which of the following options is an example of an input control?

<p>Validation of data entered into a system (C)</p> Signup and view all the answers

Which is NOT a component of general controls?

<p>Input controls (B)</p> Signup and view all the answers

What is the primary role of spyware in a computer system?

<p>To monitor user activity and capture sensitive information. (C)</p> Signup and view all the answers

Which of the following best describes a cracker?

<p>A hacker with the intent to commit criminal acts. (A)</p> Signup and view all the answers

What is the definition of phishing in the context of computer crime?

<p>Creating fake websites to collect personal data. (D)</p> Signup and view all the answers

Which method is used in pharming attacks?

<p>Redirecting users to fraudulent websites. (D)</p> Signup and view all the answers

What is a 'back door' in the context of computer security?

<p>An unauthorized way to access a system without detection. (B)</p> Signup and view all the answers

Spoofing is characterized by which of the following actions?

<p>Redirecting communications to appear as a trusted source. (D)</p> Signup and view all the answers

What does sniffing refer to in cyber security?

<p>Eavesdropping on network traffic to capture sensitive data. (C)</p> Signup and view all the answers

Identity theft entails which of the following actions?

<p>Unauthorized acquisition of personal information for fraudulent purposes. (C)</p> Signup and view all the answers

Flashcards

Computer Crime

Any criminal act that uses technology as a tool for its execution, investigation, or prosecution.

Unauthorized Access

An act of accessing a computer system without authorization, potentially leading to data breaches or unauthorized modifications.

Data Breach

The act of stealing confidential information stored on a computer system, often with the intention of gaining an advantage or causing harm.

Man-in-the-Middle Attack

Exploiting the open nature of the internet to intercept communication and steal sensitive data.

Signup and view all the flashcards

Communication Interception

Unauthorized interception of communication over networks like email, P2P, or IM.

Signup and view all the flashcards

Fixed Target for Hackers

Using fixed Internet addresses, often associated with cable or DSL modems, to target and attack specific computer systems.

Signup and view all the flashcards

War Driving

Identifying and gaining access to wireless networks by detecting SSIDs (service set identifiers) broadcast by access points.

Signup and view all the flashcards

Radio Frequency Vulnerability

The ease with which radio frequency bands used for wireless communication can be scanned and intercepted.

Signup and view all the flashcards

What is a firewall?

A combination of hardware and software designed to block unauthorized access to private networks.

Signup and view all the flashcards

What is packet filtering?

A security technology used by firewalls to analyze incoming network traffic and block packets based on predefined rules.

Signup and view all the flashcards

What is an intrusion detection system?

A system that continuously monitors network activity for suspicious patterns and alerts administrators about potential security breaches.

Signup and view all the flashcards

What is antivirus software?

Software designed to detect and remove malicious programs like viruses, worms, and Trojans from computer systems.

Signup and view all the flashcards

What is antispyware software?

Software designed to detect and remove spyware, a type of malware that secretly monitors and collects user data.

Signup and view all the flashcards

What is cryptography?

The study of methods for encoding information to conceal its contents from unauthorized individuals.

Signup and view all the flashcards

Authentication

A method of verifying a user's identity, typically using a combination of credentials like passwords or tokens.

Signup and view all the flashcards

What is encryption?

The process of transforming plaintext into ciphertext using an encryption algorithm.

Signup and view all the flashcards

What is decryption?

The process of transforming ciphertext back into plaintext using the corresponding decryption key.

Signup and view all the flashcards

Token

A small physical device that generates a unique code used for login, enhancing security.

Signup and view all the flashcards

Smart card

A card with a built-in memory chip that stores personal information, used for identification.

Signup and view all the flashcards

Biometric authentication

Using unique biological traits like fingerprints, voice patterns, or retinal scans for user verification.

Signup and view all the flashcards

Two-factor authentication

A security measure that requires two separate forms of authentication to access a system, significantly increasing security.

Signup and view all the flashcards

Strong password

A password that is easy to remember for you but difficult for others to guess.

Signup and view all the flashcards

Fingerprint analysis

A technique that uses fingerprint analysis to verify a user's identity, providing a more secure authentication method than usernames and passwords.

Signup and view all the flashcards

Preventing Unauthorized Access

The process of safeguarding information systems and data against unauthorized access, modification, or destruction.

Signup and view all the flashcards

Spyware

Software that secretly monitors your computer activities, often to steal personal information.

Signup and view all the flashcards

Key logger

Spyware that records every keystroke you make, potentially revealing passwords and sensitive information.

Signup and view all the flashcards

Hacker

An individual who attempts to gain unauthorized access to a computer system.

Signup and view all the flashcards

Cracker

A hacker with criminal intent who aims to steal information or disrupt systems.

Signup and view all the flashcards

Identity theft

A crime where someone steals your personal information, like credit card details or social security number.

Signup and view all the flashcards

Phishing

Setting up fake websites or sending emails that appear legitimate to trick people into revealing confidential information.

Signup and view all the flashcards

Pharming

Redirecting users to a fake website, potentially stealing their logins or personal data.

Signup and view all the flashcards

Backdoor

A hidden way to access a system, typically used by hackers to bypass security measures.

Signup and view all the flashcards

General Controls

General controls are safeguards that apply across all computerized applications within an organization. They ensure the security and integrity of computer programs, data files, and overall system operations.

Signup and view all the flashcards

Application Controls

Application controls are specific safeguards designed for individual software applications. They ensure the accuracy, completeness, and validity of data processed in each application.

Signup and view all the flashcards

Confidentiality

Confidentiality refers to protecting sensitive information from unauthorized access. It ensures that only authorized individuals can view or modify the data.

Signup and view all the flashcards

Integrity

Integrity ensures that data is accurate, complete, and reliable. It prevents unauthorized modifications and ensures the data remains trustworthy.

Signup and view all the flashcards

Availability

Availability ensures that information systems and data are readily accessible to authorized users when needed. This means the systems are up and running when required.

Signup and view all the flashcards

Software Patches

Software patches are small updates released by software developers to fix flaws or vulnerabilities in their programs. These patches help prevent attackers from exploiting weaknesses in the software.

Signup and view all the flashcards

Identity Management Software

Identity management software manages user identities and access rights within an organization. It tracks who has access to what, authenticates users, and controls their privileges.

Signup and view all the flashcards

Exploits

Exploits are techniques or methods employed by attackers to take advantage of vulnerabilities in software systems. They exploit weaknesses to gain unauthorized access or disrupt system operations.

Signup and view all the flashcards

Online Order Processing Risk Assessment

A method to assess the likelihood and potential impact of risks related to online orders.

Signup and view all the flashcards

Disaster Recovery Planning

A plan that outlines how to restore disrupted IT services following an unexpected event, like a power outage.

Signup and view all the flashcards

Business Continuity Planning

A plan designed to help an organization resume its critical business operations after a disruption.

Signup and view all the flashcards

Acceptable Use Policy (AUP)

A document that outlines the acceptable uses of an organization's IT resources and equipment.

Signup and view all the flashcards

Security Policy

A formal document that establishes a company's information security goals, their priorities, and the methods to achieve them.

Signup and view all the flashcards

Identity Management

The process of verifying the identity of users and controlling their access to information and systems.

Signup and view all the flashcards

Business Impact Analysis

A method used in disaster recovery and business continuity planning to determine the impact of an IT outage on the organization.

Signup and view all the flashcards

Expected Annual Loss

The potential cost of disruptions, such as power failures or user errors, during online order processing.

Signup and view all the flashcards

Study Notes

ITM 100 Class 9: Securing Information Systems

  • This class focuses on securing information systems.
  • The study material is adapted from Management Information Systems: Managing the Digital Firm, 17th Edition by Kenneth C. Laudon and Jane P. Laudon.

Real World Example - TJX

  • In 2006, TJX experienced a significant computer system security breach, affecting up to 94 million customers.
  • Albert Gonzalez received a 20-year prison sentence in 2010 for his role in the TJX breach.
  • The potential financial impact of the breach, according to federal guidelines, exceeded $400 million.
  • The breaches began in 2005 with war-driving expeditions to identify vulnerable wireless networks.
  • Hackers entered the TJX network, moved upstream to the corporate network, and installed a packet sniffer to capture transaction data.
  • Authorities discovered 16.3 million stolen credit card numbers on Gonzalez's Latvian server and another 27.5 million on a server in Ukraine.

Real World Example - Heartland Payment Systems

  • In March 2008, a breach exposed 134 million credit cards at Heartland Payment Systems.
  • Albert Gonzalez and two unnamed Russian accomplices were indicted in 2009 and Gonzalez was sentenced to 20 years in prison.
  • The vulnerability to SQL injection was known, with security analysts warning retailers well in advance, of the potential risks for years.

Top 10 Data Breaches (2008-2019)

  • This section provides a list of the top 10 data breaches between 2008 and 2019.
  • The companies included are Yahoo!, MySpace, Marriott, LinkedIn, Equifax, Heartland Payment Systems, Target, Capital One, Sony.
  • Data is provided on the service, the company involved, and dates.
  • Example: Yahoo!, Web services provider, 3000 million (2013)

System Security

  • Information systems play a crucial role in many organizations and are extremely vulnerable.
  • System failures can significantly impact a firm's business functions and profitability.
  • Critical organizational data, like confidential information, trade secrets, and new products are at risk if security measures are insufficient.
  • Security breaches can dramatically reduce a company's market value and lead to liability issues.

Why Systems Are Vulnerable

  • Hardware issues such as breakdowns, misconfigurations, and improper use can cause system vulnerabilities.
  • Software flaws and programming errors, installation problems, and unauthorized modifications are another threat to system security.
  • Systems located outside of a firm’s control also increase vulnerabilities.

Software Vulnerability

  • Commercial software often has bugs (code defects).
  • Achieving zero defects in software is not always possible due to the complexity of large programs.
  • Security vulnerabilities frequently exist that enable intrusions. Buffer overflow is an example with such vulnerabilities.

Computer Crime

  • Illegal acts against computer systems or using computers to commit crimes are considered computer crimes.
  • Gaining unauthorized access, breaching confidentiality of data, or stealing trade secrets are all types of computer-related violations.

Internet Vulnerabilities

  • The openness of the internet makes it susceptible to attacks like interception, person-in-the-middle attacks, malicious software, etc.
  • The sheer size of the internet means a successful attack can have widespread impact.

Wireless Security Challenges

  • The radio frequency spectrum used for wireless communication is easily accessible to eavesdroppers.
  • Service set identifiers (SSIDs) can be easily detected through tools like sniffer programs.
  • War-driving attempts to identify unprotected or vulnerable wireless networks.

Malicious Software

  • Malicious software, often abbreviated as malware, comes in several forms, including viruses, worms, and Trojans.
  • This software can cause damage to computers.

Computer Viruses

  • Viruses are designed to attach to other programs to execute unauthorized functions.
  • They replicate and spread to other programs and computers, sometimes by email attachments. - They can cause data damage and theft.

Worms

  • Worms replicate themselves across networks to spread across multiple computer systems.
  • They don't require an active host program to run, unlike a Virus.

Trojan Horses

  • Trojan horse programs often appear benign initially then carry out harmful actions.
  • They frequently spread viruses or malware.

SQL Injection, Spyware

  • Hackers use SQL injection attacks against database-driven applications. These attacks use maliciously crafted data submitted in web forms to execute unauthorized commands against databases.
  • Spyware includes keyloggers, applications that record user keystrokes to capture sensitive data.

Hackers and Computer Crime

  • Hackers are those individuals who attempt to gain unauthorized access to computer systems.
  • Crackers are a subset of hackers with malicious intent.

Computer Crime (Continued)

  • Identity theft, password guessing, phishing, and pharming are fraudulent activities that involve unauthorized access to personal information, which poses a significant threat.

Spoofing and Sniffing

  • Spoofing includes masquerading as another person or redirecting web links to unintended destinations.
  • Sniffing is a passive attack that observes data traveling across a network, enabling hackers to steal data like emails and company files.

Denial of Service (DoS) Attacks

  • Hackers flood a computer system with extraneous communication to crash the service.
  • Distributed DoS attacks utilize many computers to overwhelm the system.
  • Botnets are often employed in DoS attacks: networks of compromised computer systems that carry out malicious activities on command from the attacker.

Internal Threats: Employees

  • Security threats originate from within organizations, such as through insiders with inside knowledge.
  • Sloppy security practices and inadequate user training can cause weaknesses.
  • Social engineering tricks employees into revealing passwords or other sensitive data.
  • Information systems specialists and end users alike are points of weakness.

Contemporary Security Challenges and Vulnerabilities

  • Network security vulnerabilities can arise from numerous sources, including unauthorized access, tapping, message alteration, and radiation.

Security and Controls

  • Security measures, encompassing policies and procedures, are steps taken to prevent unauthorized access, damage to data, and theft.

Information Systems Controls

  • Controls are procedures employed over the entire organization's information systems, such as general controls, which address systems design or application controls which pertain to specific applications.

CIA Triad of Information Security

  • Confidentiality, Integrity, and Availability (CIA) are the three pillars of information security: Confidentiality ensures data stays secret; Integrity ensures data's accuracy and reliability; Availability ensures authorized users can access data when needed.

Tools and Technologies for Safeguarding Information Systems

  • Software patches address flaws in software programs.
  • Identity management software helps manage user accounts and access privileges.
  • Authentication methods such as password systems, tokens, smart cards, and biometric systems control access to sensitive information. Tools such as firewalls block unauthorized users. Intrusion detection systems monitor potential threats. Antivirus software checks for and removes malware.

Preventing Unauthorized Access

  • Guidelines for passwords should be easy to remember but hard to guess. This advice includes mixing upper and lowercase letters, numbers, and special characters to avoid simple guessing tactics.

Risk Assessment

  • Risk assessments are crucial to determine the probability and potential cost of system vulnerabilities.
  • Risk assessment considers types of threats, potential losses, and expected annual losses.

Online Order Processing Risk Assessment

  • An example demonstrates classifying exposure to risk with probability of occurrence and loss ranges.

Security Policy

  • Security policies outline appropriate security goals, acceptable use policies, and computing equipment standards.

Disaster Recovery Planning and Business Continuity Planning

  • Disaster recovery plans aim to restore disrupted services after a disaster.
  • Business continuity plans address continuing business operations after a major disruption.

The Role of Auditing

  • Information systems audits evaluate the organization’s overall security posture.
  • Security audits review technologies, procedures, documentation, training, and personnel.
  • Auditors can simulate disaster scenarios to test response capabilities.

Sample Auditor's List of Control Weaknesses

  • This is an example of findings from an information systems audit.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

This quiz covers key concepts related to the security of information systems as outlined in Management Information Systems: Managing the Digital Firm. The focus will be on real-world examples, particularly the TJX security breach, to illustrate the importance of securing digital information. Test your understanding of the implications of such breaches and the measures needed to protect systems.

More Like This

Computer Security Basics
15 questions
Network Security Overview
5 questions

Network Security Overview

AdequateSalamander avatar
AdequateSalamander
Cybersecurity in Information Technology
10 questions
Use Quizgecko on...
Browser
Browser