Page 359 -
P. 359

358 Part Two  Information Technology Infrastructure


        Key Terms

        Acceptable use policy (AUP), 342                     Identity theft, 332
        Antivirus software, 348                              Intrusion detection systems, 348
        Application controls, 340                            Keyloggers, 330
        Authentication, 346                                  Malware, 328
        Biometric authentication, 346                        Managed security service providers (MSSPs), 352
        Botnet, 331                                          MIS audit, 344
        Bugs, 335                                            Online transaction processing, 351
        Business continuity planning, 344                    Password, 346
        Click fraud, 334                                     Patches, 337
        Computer crime, 332                                  Pharming, 333
        Computer forensics, 339                              Phishing, 333
        Computer virus, 328                                  Public key encryption, 350
        Controls, 325                                        Public key infrastructure (PKI), 350
        Cybervandalism, 330                                  Recovery-oriented computing, 351
        Cyberwarfare, 334                                    Risk assessment, 341
        Deep packet inspection (DPI), 352                    Sarbanes-Oxley Act, 339
        Denial-of-service (DoS) attack, 331                  Secure Hypertext Transfer Protocol (S-HTTP), 349
        Digital certificates, 350                            Secure Sockets Layer (SSL), 349
        Disaster recovery planning, 344                      Security, 325
        Distributed denial-of-service (DDoS) attack, 331     Security policy, 342
        Downtime, 351                                        Smart card, 346
        Drive-by download, 328                               Sniffer, 331
        Encryption, 349                                      Social engineering, 335
        Evil twin, 333                                       Spoofing, 331
        Fault-tolerant computer systems, 351                 Spyware, 330
        Firewall, 347                                        SQL injection attack, 330
        General controls, 340                                Token, 346
        Gramm-Leach-Bliley Act, 339                          Trojan horse, 329
        Hacker, 330                                          Unified threat management (UTM), 349
        High-availability computing, 351                     War driving, 327
        HIPAA, 338                                           Worms, 328
        Identity management, 342






        Review Questions

          1.  Why are information systems vulnerable to          •  Explain how software defects affect system
            destruction, error, and abuse?                          reliability and security.
            •  List and describe the most common threats      2.  What is the business value of security and
               against contemporary information systems.           control?
            •  Define malware and distinguish among a            •  Explain how security and control provide
               virus, a worm, and a Trojan horse.                   value for businesses.
            •  Define a hacker and explain how hackers           •  Describe the relationship between security
                 create security problems and damage  systems.      and control and recent U.S. government
                                                                      regulatory requirements and computer
            •  Define computer crime. Provide two examples
                                                                      forensics.
               of crime in which computers are targets and
               two examples in which computers are used as    3.  What are the components of an organizational
               instruments of crime.                             framework for security and control?
            •  Define identity theft and phishing and explain    •  Define general controls and describe each
               why identity theft is such a big problem today.      type of general control.
            •  Describe the security and system reliability      •  Define application controls and describe each
               problems created by employees.                       type of application control.






   MIS_13_Ch_08 Global.indd   358                                                                             1/17/2013   3:10:24 PM
   354   355   356   357   358   359   360   361   362   363   364