Study sets, textbooks, questions
Upgrade to remove ads
IS 3003 Ch 8: Securing Information Systems
Terms in this set (119)
Acceptable Use Policy (AUP)
Acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet. Identifies acceptable and unacceptable practices for all users.
Prevents, detects, and removes malware, including computer viruses, computer worms, Trojan horses, spyware, and adware. Must perform regular updates. (consider holistic protection)
Why Increase In Attacks
Speed of attacks
More sophisticated attacks
Simplicity of attack tools
Faster detection weaknesses
Delays in user patching
Attacks exploit user ignorance & confusion
is an organizational asset - it must be protected
Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems
The protection of information from accidental or intentional misuse by persons inside or outside the organization
Methods, policies, and organizational procedures that ensure safety of organization's assets; accuracy and reliability of its accounting records; and operational adherence to management standards
Factors Driving the importance of security ...
1. Evolution from mainframe environment to
today's interconnected, wireless, networked
2. Trend toward smaller, faster, cheaper, portable
computers and storage devices
3. Increased employee use of unmanaged devices
4. The computer skills necessary to be a hacker
are decreasing ...
5. International organized crime is taking over
"any violations of criminal law that involve knowledge of computer technology for their perpetration, investigation, or prosecution" [defined by U.S. Department of Justice]
Commission of illegal acts through use of computer or against a computer system - computer may be the object (target) or the instrument of crime
Computers as Targets of Crime
- Breaching the confidentiality of protected
- Accessing computer system without authority
- Knowingly accessing a protected computer to
- Intentionally accessing a protected system and causing
damage, negligently or deliberately
- Knowingly transmitting a program, program
code, or command that intentionally causes
damage to a protected computer
- Threatening to cause damage to a protected
Computer as Instruments of Crime
- Theft of trade secrets
- Unauthorized copying of software or
copyrighted intellectual property, such as
articles, books, music, and video
- Schemes to defraud
- Using e-mail for threats or harassment
- Intentionally attempting to intercept electronic
- Illegally accessing stored electronic
communications, including e-mail and voice mail
- Transmitting or possessing child pornography
using a computer
- A crime in which an impostor obtains key pieces
of personal information to impersonate someone
- The forging of someone's identity for the
purpose of fraud
- "total identity theft" ....
- Identity Theft Resource Center
Click fraud -
occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase
Click Farm -
a business that pays employees to click on website elements to artificially boost the status of a client's website or product
a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot. For example, humans can read distorted text, but current computer programs can't:
Breakdowns, configuration errors, damage from improper use or crime, theft of devices
Sets with similar terms
Management Information Systems Chapter 8
MIS- Chapter 8
MIS - Chapter 7 Terms
Securing Information Systems (ITSS)
Sets found in the same folder
Chapter 4 Simulation
Other sets by this creator
NT Quiz 4 with answers
RLGN1302 NT History Second Exam Preview
RLGN 1302 NT Quiz 3
Which of the following is not an example of sport? a. a baseball game between two major league teams b. a baseball game between two minor league teams c. a spontaneous race between two cyclists d. a swim meet involving amateur athletes.
Predict which of the following are drives (D), which are reflexes (R), which are instincts (I), and which are creations of culture (C). a. eye blinking in dust storm b. need for sleep c. reaction to a loud noise d. socialism e. reproduction f. racial inequality.
What are folkways? Give three examples of folkways either of United States or elsewhere?
Statistically, out of 500 people, how many would belong to the upper class?
Other Quizlet sets
Biopsych Exam 2: Psychopharmacology
Renaissance study guide
This person will help you select the correct courses, review the course requirements in the field you have selected to pursue and help you with any academic problems you may encounter.
According to the text, preparing for a cyberattack was a top priority for national security in the late 1980s.
Internet payments for items costing from a few cents to approximately a dollar are called ?
Rural areas face the same problems as large urban areas, including drugs, gang activity, racism, and homeless. However, most rural areas have more than adequate resources to address these problems because everyone lends a helping hand.