Term
|
Definition
refers to all of the processes and policies designed to protect an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction |
|
|
Term
|
Definition
an information resource is any danger to which a system may be exposed. |
|
|
Term
|
Definition
information resources is the harm, loss or damage that can result if a threat compromises that resource. |
|
|
Term
|
Definition
information resources is the harm, loss or damage that can result if a threat compromises that resource. |
|
|
Term
|
Definition
in general, is any network external to your organization. |
|
|
Term
|
Definition
occurs when the attacker watches another person’s computer screen over that person’s shoulder. Particularly |
|
|
Term
|
Definition
an attack where the attacker uses social skills to trick a legitimate employee into providing confidential company information such as passwords. |
|
|
Term
8. Competitive intelligence |
|
Definition
consists of legal information-gathering techniques. |
|
|
Term
|
Definition
crosses the legal boundary of information-gathering techniques |
|
|
Term
11. Intellectual property. |
|
Definition
Property created by individuals or corporations which are protected under trade secret, patent, and copyright laws. |
|
|
Term
|
Definition
Property created by individuals or corporations which are protected under trade secret, patent, and copyright laws. |
|
|
Term
|
Definition
Document that grants the holder exclusive rights on an invention or process for 20 years. |
|
|
Term
|
Definition
Statutory grant that provides creators of intellectual property with ownership of the property for life of the creator plus 70 years. |
|
|
Term
|
Definition
Copying a software program without making payment to the owner. |
|
|
Term
|
Definition
segment of computer code that performs malicious actions by attaching to another computer program. |
|
|
Term
|
Definition
segment of computer code that performs malicious actions and will spread by itself without requiring another computer program. |
|
|
Term
|
Definition
computer program that hides in another computer program and reveals its designated behavior only when it is activated. |
|
|
Term
|
Definition
is a segment of computer code that is embedded inside an organization’s existing computer programs and is designed to activate and perform a destructive action at a certain time or date. |
|
|
Term
|
Definition
use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages. |
|
|
Term
21. In a distributed denial-of-service attack, |
|
Definition
the attacker first takes over many computers. These computers are called zombies or bots. Together, these bots form a botnet. |
|
|
Term
|
Definition
record your keystrokes and your Web browsing history. |
|
|
Term
|
Definition
collects personal information about users without their consent. Two types of spyware are keystroke loggers (key loggers) and screen scrapers |
|
|
Term
|
Definition
record a continuous “movie” of what you do on a screen. |
|
|
Term
|
Definition
is alien software that is designed to use your computer as a Launchpad for spammers. |
|
|
Term
|
Definition
|
|
Term
|
Definition
are small amounts of information that Web sites store on your computer. |
|
|
Term
28. A supervisory control and data acquisition (SCADA) system |
|
Definition
is a large-scale, distributed, measurement and control system. |
|
|
Term
|
Definition
The probability that a threat will impact an information resource. |
|
|
Term
|
Definition
To identify, control and minimize the impact of threats. |
|
|
Term
|
Definition
To assess the value of each asset being protected, estimate the probability it might be compromised, and compare the probable costs of it being compromised with the cost of protecting it. |
|
|
Term
|
Definition
To assess the value of each asset being protected, estimate the probability it might be compromised, and compare the probable costs of it being compromised with the cost of protecting it. |
|
|
Term
|
Definition
Accept the potential risk, continue operating with no controls, and absorb any damages that occur. |
|
|
Term
|
Definition
Limit the risk by implementing controls that minimize the impact of threat. |
|
|
Term
|
Definition
Transfer the risk by using other means to compensate for the loss, such as purchasing insurance. |
|
|
Term
|
Definition
Physical protection of computer facilities and resources. |
|
|
Term
|
Definition
Restriction of unauthorized user access to computer resources; use biometrics and passwords controls for user identification. |
|
|
Term
38. Communications (network) controls. |
|
Definition
To protect the movement of data across networks and include border security controls, authentication and authorization. |
|
|
Term
|
Definition
Major objective is proof of identity. |
|
|
Term
40. Something the User Is |
|
Definition
Also known as biometrics, these access controls examine a user's innate physical characteristics. |
|
|
Term
41. Something the User Has |
|
Definition
- These access controls include regular ID cards, smart cards, and tokens. |
|
|
Term
42. Something the User Does |
|
Definition
These access controls include voice and signature recognition. |
|
|
Term
43. Something the User Knows |
|
Definition
These access controls include passwords and passphrases. A password is a private combination of characters that only the user should know. A passphrase is a series of characters that is longer than a password but can be memorized easily. |
|
|
Term
|
Definition
Permission issued to individuals and groups to do certain activities with information resources, based on verified identity. |
|
|
Term
|
Definition
is a collection of related computer system operations that can be performed by users of the system. |
|
|
Term
|
Definition
principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization. |
|
|
Term
|
Definition
System that enforces access-control policy between two networks. |
|
|
Term
|
Definition
(also called antivirus software) are software packages that attempt to identify and eliminate viruses, worms, and other malicious software. The logos show three well-known anti-malware companies. Clicking on the link will take you to each company’s homepage, respectively. |
|
|
Term
|
Definition
is a process in which a company identifies the software that it will allow to run and does not try to recognize malware. |
|
|
Term
|
Definition
s a process in which a company allows all software to run unless it is on the blacklist. |
|
|
Term
54. Employee monitoring systems |
|
Definition
monitor employees’ computers, e-mail activities, and Internet surfing activities. |
|
|
Term
|
Definition
Process of converting an original message into a form that cannot be read by anyone except the intended receiver. |
|
|
Term
|
Definition
is a private network that uses a public network (usually the Internet) to connect users. |
|
|
Term
53. Secure socket layer (SSL), now called transport layer security (TLS), |
|
Definition
is an encryption standard used for secure transactions such as credit card purchases and online banking. |
|
|
Term
55. A demilitarized zone (DMZ) |
|
Definition
located between the two firewalls; the DMZ contains company servers that typically handle Web page requests and e-mail. |
|
|
Term
56. A digital certificate |
|
Definition
is an electronic document attached to a file certifying that the file is from the organization that it claims to be from and has not been modified from its original format. |
|
|
Term
57. Certificate authorities |
|
Definition
who are trusted intermediaries between two organizations, issue digital certificates. |
|
|
Term
|
Definition
encrypts each data packet that is sent and places each encrypted packet inside another packet. |
|
|
Term
|
Definition
is a fully configured computer facility, with all services, communications links, and physical plant operations. |
|
|
Term
|
Definition
provides many of the same services and options of the hot site, but it typically does not include the actual applications the company runs. |
|
|
Term
|
Definition
provides only rudimentary services and facilities and so does not supply computer hardware or user workstations. |
|
|
Term
62. Information systems auditing |
|
Definition
Independent or unbiased observers task to ensure that information systems work properly. |
|
|
Term
|
Definition
Examination of information systems, their inputs, outputs and processing. |
|
|
Term
Types of Auditors and Audits |
|
Definition
64. Internal. Performed by corporate internal auditors. 65. External. Reviews internal audit as well as the inputs, processing and outputs of information systems. 66. Auditing around the computer means verifying processing by checking for known outputs or specific inputs. 67. Auditing through the computer means inputs, outputs and processing are checked. 68. Auditing with the computer means using a combination of client data, auditor software, and client and auditor hardware. |
|
|
Term
|
Definition
Performed by corporate internal auditors. |
|
|
Term
|
Definition
Reviews internal audit as well as the inputs, processing and outputs of information systems. |
|
|
Term
66. Auditing around the computer |
|
Definition
means verifying processing by checking for known outputs or specific inputs. |
|
|
Term
67. Auditing through the computer |
|
Definition
means inputs, outputs and processing are checked. |
|
|
Term
68. Auditing with the computer |
|
Definition
means using a combination of client data, auditor software, and client and auditor hardware. |
|
|