MIS Laudon Ch. 8

MANAGEMENT INFORMATION SYSTEMS Managing the Digital Firm    4th Edition   Ch. 8 Securing Information Systems

73 cards   |   Total Attempts: 182
  

Cards In This Set

Front Back
Acceptable use policy (acro.)
AUP
Access control
All the policies and procedures a company uses to prevent improper access to systems by unauthorized insiders and outsiders. 282
Acceptable use policy
Defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet. 279
Antivirus software
Designed to check computer systems and drives for the presence of computer viruses. 285
Application proxy filtering
Stops data packets originating outside the organization, inspects them, and passes a proxy to the other side of the firewall. 284
Authentication
The ability to know that a person is who he or she claims to be. 282
Authorization management systems
Establish where and when a user is permitted to access certain parts of a Web site or a corporate database. 279
Authorization policies
Determine differing levels of access to information assets for different levels of users. 279
Biometric authentication
Compares a person's unique characteristics, such as the fingerprints, face, or retinal image, against a stored set profile of these characteristics to determine whether there are any differences between these characteristics and the stored profile. 283
Botnet
Infect other people's computers with bot malware that opens a back door through which an attacker can give instructions. 271
Business continuity planning
Focuses on how the company can restore business opreations after a disaster strikes; identifies critical business processes and determines action plans for handling mission-critical functions if systems go down. 280
Chief Security Officer (acro.)
CSO
Click fraud
When an individual or computer prgram fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase. 274
Chief Security Officer
Responsible for enforcing the firm's security policy. 279
Computer forensics
The scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law. 277