Page 454 - Using MIS
P. 454

422       Chapter 10  Information Systems Security


                            aCtIve revIew






        Use this Active Review to verify that you understand the ideas   Define malware, and name five types of malware. Describe six
        and concepts that answer the chapter’s study questions.  ways to protect against malware. Summarize why malware is a
                                                              serious problem. Explain how PRIDE is designed for security.
        Q1  What is the goal of information
        systems security?                                     Q6  How can data safeguards protect
                                                              against security threats?
        Define threat, vulnerability, safeguard, and target. Give an ex-
        ample of each. List three types of threats and five types of secu-  Define data administration and database administration, and
        rity losses. Give different examples for the three rows of Figure   explain their difference. List data safeguards.
        10-2. Summarize each of the elements in the cells of Figure 10-
        3. Explain why it is difficult to know the true cost of computer   Q7  How can human safeguards protect
        crime. Explain the goal of IS security.               against security threats?

        Q2  How big is the computer security                  Summarize human safeguards for each activity in Figure
        problem?                                              10-13. Summarize safeguards that pertain to nonemployee
                                                              personnel. Describe three dimensions of safeguards for ac-
        Explain why it is difficult to know the true size of the computer   count administration. Explain how system procedures can
        security problem in general and of computer crime in particu-  serve as human safeguards. Describe security monitoring
        lar. List the takeways in this question and explain the meaning   techniques.
        of each.
                                                              Q8  How should organizations respond to
        Q3  How should you respond to security                security incidents?
        threats?
                                                              Summarize the actions that an organization should take when
        Explain each of the elements in Figure 10-7. Define IDS, and   dealing with a security incident.
        explain why the use of an IDS program is sobering, to say the
        least. Define brute force attack. Summarize the characteristics   Q9  2025?
        of a strong password. Explain how your identity and password
        do more than just open doors on your computer. Define cookie   What, in the opinion of the author, is likely to happen regard-
        and explain why using a program like CCleaner is a good ex-  ing cyberwarfare in the next 10 years? Explain how the phrase
        ample of the computer security trade-off.             cat and mouse pertains to the evolution of computer crime.
                                                              Describe the types of security problems that are likely to occur
        Q4  How should organizations respond to               in the next 10 years. Explain how the focus of computer crimi-
        security threats?                                     nals will likely change in the next 10 years. Explain how this is
                                                              likely to impact smaller organizations, and you.
        Name and describe two security functions that senior manage-
        ment should address. Summarize the contents of a security   using Your Knowledge
        policy. Explain what it means to manage risk. Summarize the   with priDe
        steps that organizations should take when balancing risk and
        cost.                                                 As an employee, investor, or advisor to PRIDE Systems, you
                                                              can use the knowledge of this chapter to understand the se-
        Q5  How can technical safeguards protect              curity threats to which any business is subject. You know the
        against security threats?                             need to trade off cost versus risk. You also know three catego-
                                                              ries of safeguards and the major types of safeguards for each.
        List five technical safeguards. Define  identification and  au-  And, Zev Friedman you know what it means to design for secu-
        thentication. Describe three types of authentication. Explain   rity. You can also help ensure that PRIDE Systems employees
        how SSL/TLS works. Define firewall, and explain its purpose.   and PRIDE users create and use strong passwords.
   449   450   451   452   453   454   455   456   457   458   459