Exam 12: Information Systems Development
How should organizations respond to security incidents?
First, every organization should have an incident-response plan as part of the security program. No organization should wait until some asset has been lost or compromised before deciding what to do. The plan should include how employees are to respond to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss. An incident-response plan will stipulate what an employee should do when he notices the virus. It should specify whom to contact and what to do. It may stipulate that the employee should turn off his computer and physically disconnect from the network. The plan should also indicate what users with wireless computers should do. When an incident does occur, speed is of the essence. The longer the incident goes on, the greater the cost. Viruses and worms can spread very quickly across an organization's networks, and a fast response will help to mitigate the consequences. Because of the need for speed, preparation pays. The incident-response plan should identify critical personnel and their off-hours contact information. These personnel should be trained on where to go and what to do when they get there. Finally, organizations should periodically practice incident response. Without such practice, personnel will be poorly informed on the response plan, and the plan itself may have flaws that only become apparent during a drill.
Define threat, vulnerability, safeguard, and target.
A threat is a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A vulnerability is an opportunity for threats to gain access to individual or organizational assets. For example, when an individual buys something online, he/she provides credit card data; when that data is transmitted over the Internet, it is vulnerable to threats. A safeguard is some measure that individuals or organizations take to block the threat from obtaining the asset. Finally, the target is the asset that is desired by the threat.
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?
C
Even short passwords with no special characters can make strong passwords.
A new hire must seek out the employer's security policy if it is not discussed in new-employee training.
Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol?
Which of the following is most likely to be a result of hacking?
Technical safeguards involve the hardware and software components of an information system.
________ occurs when someone deceives by pretending to be someone else.
Phishing is a technique for intercepting computer communications.
When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, it is called a denial-of-service attack.
The losses due to human error are minimal; hence, organizations tend to ignore these losses.
In symmetric encryption, two different keys are used to encode and decode a message.
An intrusion detection system (IDS) is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)