Page 455 - Using MIS
P. 455
Using Your Knowledge 423
key terMS and ConCePtS
Advanced Persistent Threat https 405 Privacy Act of 1974 402
(APT) 394 Human safeguards 409 Public key encryption 405
Adware 407 Identification 401 Safeguard 390
Asymmetric encryption 405 Internal firewalls 406 Secure Sockets Layer (SSL) 405
Authentication 401 Intrusion detection system Security 418
Biometric authentication 404 (IDS) 397 Smart cards 404
Brute force attack 397 IP spoofing 393 Sniffing 393
Cookies 398 Key 404 Spoofing 393
Data administration 409 Key escrow 409 Spyware 407
Data safeguards 409 Key loggers 407 SQL injection attack 408
Database administration 409 Malware 407 Symmetric encryption 405
Denial of service (DoS) 394 Malware definitions 408 Target 390
Email spoofing 393 Packet-filtering firewall 406 Technical safeguards 401
Encryption 404 Payload 407 Threat 390
Encryption algorithms 404 Perimeter firewall 406 Transport Layer Security
Firewall 406 Personal identification number (TLS) 405
Gramm-Leach-Bliley (GLB) Act 402 (PIN) 404 Trojan horses 407
Hacking 393 Phisher 393 Usurpation 393
Hardening 412 Phishing 393 Virus 407
Health Insurance Portability and Pretexting 392 Vulnerability 390
Accountability Act (HIPAA) 402 PRISM 418 Wardrivers 393
Honeypots 415 Privacy 418 Worm 407
MyMISLab ™
Go to mymislab.com to complete the problems marked with this icon .
uSInG your knowLedGe
10-1. Credit reporting agencies are required to provide you with sensitive or proprietary data, are you necessarily in
a free credit report each year. Most such reports do not in- trouble? Under what circumstances should you now
clude your credit score, but they do provide the details on focus on updating your resume for your new employer?
which your credit score is based. Use one of the following 10-3. Suppose you alert your boss to the security threats
companies to obtain your free report: www.equifax.com, in Figure 10-3 and to the safeguards in Figure 10-8.
www.experion.com, and www.transunion.com. Suppose he says, “Very interesting. Tell me more.” In
a. You should review your credit report for obvious er- preparing for the meeting, you decide to create a list of
rors. However, other checks are appropriate. Search talking points.
the Web for guidance on how best to review your a. Write a brief explanation of each threat in Figure 10-3.
credit records. Summarize what you learn. b. Explain how the five components relate to safeguards.
b. What actions can you take if you find errors in your c. Describe two to three technical, two to three data,
credit report? and two to three human safeguards.
c. Define identity theft. Search the Web and determine d. Write a brief description about the safeguards in
the best course of action if someone thinks he or she Figure 10-13.
has been the victim of identity theft.
e. List security procedures that pertain to you, a tem-
10-2. Suppose you lose your company laptop at an airport. porary employee.
What should you do? Does it matter what data are f. List procedures that your department should have
stored on your disk drive? If the computer contained with regard to disaster planning.