Page 455 - Using MIS
P. 455

Using Your Knowledge    423

              key terMS and ConCePtS


            Advanced Persistent Threat          https  405                          Privacy Act of 1974   402
              (APT)  394                        Human safeguards   409              Public key encryption   405
            Adware  407                         Identification  401                 Safeguard  390
            Asymmetric encryption   405         Internal firewalls   406            Secure Sockets Layer (SSL)   405
            Authentication  401                 Intrusion detection system          Security  418
            Biometric authentication   404        (IDS)  397                        Smart cards   404
            Brute force attack   397            IP spoofing   393                   Sniffing  393
            Cookies  398                        Key  404                            Spoofing  393
            Data administration   409           Key escrow   409                    Spyware  407
            Data safeguards   409               Key loggers   407                   SQL injection attack   408
            Database administration   409       Malware  407                        Symmetric encryption   405
            Denial of service (DoS)   394       Malware definitions   408           Target  390
            Email spoofing   393                Packet-filtering firewall   406     Technical safeguards   401
            Encryption  404                     Payload  407                        Threat  390
            Encryption algorithms   404         Perimeter firewall   406            Transport Layer Security
            Firewall  406                       Personal identification number        (TLS)  405
            Gramm-Leach-Bliley (GLB) Act   402    (PIN)  404                        Trojan horses   407
            Hacking  393                        Phisher  393                        Usurpation  393
            Hardening  412                      Phishing  393                       Virus  407
            Health Insurance Portability and    Pretexting  392                     Vulnerability  390
              Accountability Act (HIPAA)   402  PRISM  418                          Wardrivers  393
            Honeypots  415                      Privacy  418                        Worm  407


             MyMISLab       ™

             Go to mymislab.com to complete the problems marked with this icon   .



              uSInG your knowLedGe


            10-1.  Credit reporting agencies are required to provide you with   sensitive or proprietary data, are you necessarily in
                 a free credit report each year. Most such reports do not in-  trouble? Under what circumstances should you now
                 clude your credit score, but they do provide the details on   focus on updating your resume for your new employer?
                 which your credit score is based. Use one of the following   10-3.  Suppose  you alert your  boss to  the security  threats
                 companies to obtain your free report: www.equifax.com,   in Figure 10-3 and to the safeguards in Figure 10-8.
                 www.experion.com, and www.transunion.com.             Suppose he says, “Very interesting. Tell me more.” In
                 a.  You should review your credit report for obvious er-  preparing for the meeting, you decide to create a list of
                    rors. However, other checks are appropriate. Search   talking points.
                    the Web for  guidance  on how  best  to  review  your   a.  Write a brief explanation of each threat in Figure 10-3.
                    credit records. Summarize what you learn.          b.  Explain how the five components relate to safeguards.
                 b.  What actions can you take if you find errors in your   c.  Describe two to three technical, two to three data,
                    credit report?                                        and two to three human safeguards.
                 c.  Define identity theft. Search the Web and determine   d.  Write a brief description about the safeguards in
                    the best course of action if someone thinks he or she   Figure 10-13.
                    has been the victim of identity theft.
                                                                       e.  List security procedures that pertain to you, a tem-
            10-2.  Suppose you lose your company laptop at an airport.    porary employee.
                 What should you do? Does it matter what data are      f.  List procedures that your department should have
                 stored on your disk drive? If the computer contained     with regard to disaster planning.
   450   451   452   453   454   455   456   457   458   459   460