Shared Flashcard Set

Details

ACG 4401 Chapter 7
Accounting Information Systems - Exam 1
57
Accounting
Undergraduate 4
02/15/2010

Additional Accounting Flashcards

 


 

Cards

Term
securities procedures
Definition
- provide for processing integrity by preventing submission of unauthorized or fictitious transactions and unauthorized changes to stored data or programs
- protect against a variety of attacks, including viruses and worms, thereby ensuring the system is available when needed
Term
three fundamental information security concepts
Definition
- security as a management issue, not a technology issue
- time-based model of security
- defense in depth
Term
security as a management issue
Definition
- develop and document policies
- effectively communicate those policies to all authorized users
- design and employ appropriate control procedures to implement those policies
- monitor the system, and take corrective action to maintain compliance with the policies
Term
time-based model of security
Definition
- given enough time and resources, any preventive control can be circumvented
- consequently, effective control requires supplementing preventive procedures with methods for detecting incidents and procedures for taking corrective remedial action
- detection and correction must be timely, especially for information security, because once preventive controls have been breached, it takes little time to destroy, compromise, or steal the organization's economic and information resources
Term
reconnaissance
Definition
- collecting information to identify potential vulnerabilities
Term
social engineering
Definition
- tricking unsuspecting employees into allowing access to system
Term
scan and map
Definition
- detailed scan of system to identify potential points of remote entry
Term
research
Definition
- researching vulnerabilities of software identified during scan
Term
attack execution
Definition
- unauthorized access to system
Term
cover tracks
Definition
- removing evidence of attack
Term
major types of preventive controls used for defense in depth
Definition
- authentication controls
- authorization controls
- training
- physical access controls
- remote access controls
- host and application hardening procedures
- encryption
Term
authentication controls
Definition
- passwords
- tokens
- biometrics
- MAC addresses
Term
authentication controls
Definition
- access control matrices
- compatibility tests
- implemented by creating an access control matrix
- specifies what part of the IS a user can access and what actions they are permitted to perform
- when an employee tries to access a particular resource, the system performs a compatibility test that matches the user's authentication credentials against the matrix to determine if the action should be allowed
Term
firewall
Definition
- either a special-purpose hardware device or software running on a general purpose computer
Term
intrusion prevention systems
Definition
- deep packet inspection is the heart of a new type of filter
- designed to identify and drop packets that are part of an attack
Term
software design
Definition
- attacks often exploit software vulnerabilities
- buffer overflows
- SQL injections
- cross-site scripting
- buffer overflow attack
Term
buffer overflow attack
Definition
- attacker sends a program more data than it can handle
- may cause the system to crash or provide a command prompt, giving the attacker full administrative privileges and control
Term
encryption
Definition
- the process of transforming normal text into unreadable gibberish
Term
plaintext
Definition
- normal text
Term
cipertext
Definition
- unreadable gibberish
Term
decryption
Definition
- reverses the encryption process
Term
digital signature
Definition
- assymetric encryption and hashing are used to create digital signitures
- information encrypted with the creator's private key
- information can only be decrypted using the corresponding public key
- so successful decryption with an entity's public key proves the message could only have been created by the entity that holds the corresponding private key
- the private key is known only to its owner, so only the owner could have created the message
Term
digital certificate
Definition
- electronic document, created and digitally signed by a trusted third party
- certifies the identity of the owner of a particular public key
- contains that party's public key
- these certificates can be stored on websites
- browsers are designed to automatically obtain a copy of that digital certificate and use the public key contained therein to communicate with the website
- you can manually examine the contents of a website's digital certificate by double-clicking on the lock icon that appears in the lower, right-hand corner of the browser window
- digital certificates provide an automated method for obtaining an organization's or individual's public key
Term
public key infrastructure (PKI)
Definition
- system and processes used to issue and manage asymmetric keys and digital certificates
Term
certificate authority
Definition
- an organization that issues public and private keys and records the public key in a digital certificate
- hashes the information stored on a digital certificate
- encrypts that hash with its private key
- appends that digital signature to the digital certificate
Term
e-signatures
Definition
- use a cursive imprint of a person's name applied to an electronic document
- legally binding like a paper document
Term
three key components that satisfy the preceding criteria
Definition
- establishment of a computer emergency response team
- designation of a specific individual with organization-wide responsibility for security
- an organized patch management system
Term
defense-in-depth
Definition
- employ multiple layers of control in order to avoid having a single point of failure
Term
authentication
Definition
- focuses on verifying the identity of the person or device attempting to access the system
Term
multifactor authentication
Definition
- the use of two or more methods of basic authentication at once
Term
authorization
Definition
- restricts access of authenticated users to specific portions of the system and specifies what actions they are permitted to perform
Term
access control matrix
Definition
- table specifying which portions of the system users are permitted to access and what actions they can perform
Term
compatibility test
Definition
- matches the user's authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action
Term
social engineering
Definition
- use deception to obtain unauthorized access to information resources
Term
border router
Definition
- connects an organization's information system to the internet
Term
demilitarized zone (DMZ)
Definition
- separate network that permits controlled access from the internet to selected resources, such as the organization's e-commerce web server
Term
transmission control protocol (TCP)
Definition
- specifies the procedures for dividing files and documents into packets to be sent over the internet and the methods for reassembly of the original document or file at the destination
Term
internet protocol (IP)
Definition
- specifies the structure of those packets and how to route them to the proper destination
Term
routers
Definition
- designed to read the destination address fields in IP packet headers to decide where to send (route) the packet next
Term
access control list (ACL)
Definition
- determines which packets are allowed entry and which are dropped
Term
static packet filtering
Definition
- screens individual IP packets based solely on the contents of the source and/or destination field in the IP packet header
Term
stateful packet filtering
Definition
- maintains a table that lists all established connections between the organization's computers and the internet
Term
deep packet inspection
Definition
- firewalls that examine the data in the body of an IP packet can provide more effective access control than those that look only at information in the IP header
Term
intrusion prevention systems (IPS)
Definition
- designed to identify and drop packets that are part of an attack
Term
remote authentication dial-in user service (RADIUS)
Definition
- standard method for verifying the identity of users attempting to obtain dial-in access
Term
vulnerabilities
Definition
- potential point of attack
- flaws
Term
hardening
Definition
- process of turning off unnecessary features
Term
key escrow
Definition
- making copies of all encryption keys used by employees and storing those copies securely
Term
hashing
Definition
- process that takes plaintext of any length and transforms it into a short code
Term
log analysis
Definition
- process of examining logs to monitor security
Term
intrusion detection systems (IDS)
Definition
- create logs of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions
Term
vulnerability scans
Definition
- automated tools designed to identify whether a given system possess any well-known vulnerabilities
Term
penetration test
Definition
- authorized attempt by either an internal audit team or an external security consulting firm to break into the organization's information system
Term
computer emergency response team (CERT)
Definition
- sometimes referred to as a computer incident response team (CIRT)
- responsible for dealing with major incidents
- should include not only technical specialists but also senior operations management, because some potential responses to security incidents have significant economic consequences
Term
exploit
Definition
- set of instructions for taking advantage of a vulnerability
Term
patch
Definition
- code released by software developers that fixes a particular vulnerability
Term
patch management
Definition
- process for regularly applying patches and updates to all software used by the organization
Supporting users have an ad free experience!