ISTM FINAL EXAM QUESTIONS & ANSWERS
people.tamu.edu - Answers -authorized A&M user can create website on here, but are
responsible for how website looks
Risk Management - Answers --using strategies to reduce the amount of risk and think
of consequences if something were to go badly
-use a when we get hacked not if we get hacked mindset
-back up everything on system to prepare
white hack hacker - Answers -help test own organizations security by hacking into it.
mitigate - Answers -reduce risk
unsecured computers - Answers -susceptible to malware
intranet - Answers --protected with firewalls
-business network
-local network
-more secure
firewall - Answers -entails specialized hardware and software working together that
ensures that only authorized personnel and employees within a business can use its
Intranet
internet fraud - Answers -any fraudulent activity in an online setting. Internet fraud can
occur through email systems, message boards, chat rooms, or websites.
identity theft - Answers -crime concerning the unlawful practice of assuming another
individual's identity for economic gain, and it is one of the fastest growing crimes in the
United States and Canada.
trojan horse - Answers -certain day, sudden havack
Spyware - Answers -Software that installs itself on a user's system without permission
and gleans personal data and information about the user without their knowledge or
permission
adware - Answers -Software that routinely displays advertising to a computer system
after the software is installed, usually without the user's consent.
spam/junk mail - Answers -abuse of email system.
unsolicited email messages sent to a massive audience.
,reverse phishing/key logging - Answers -when user sign in to. computer, malicious
software covertly records keystrokes
antivirus software - Answers -be aware if package is working well enough to prevent
your machine from virus. Norton McCaffee
brand new code/virus - Answers -hard to stop, but updates are made to protect you
from
what commercial came on a lot during Masters? - Answers -IBM
click fraud - Answers -manipulating the number of times an ad is clicked on to inflate
advertising bills
purchase scam - Answers -merchant doesn't deliver to customer
phishing - Answers --#1 way hackers get into business
-engineered to gain private info by asking over email
computer privacy - Answers -- remain anonymous while using computer system or
network
-people protection
confidentiality privacy - Answers -business protection
shoulder surfing - Answers --type of identity theft
-criminal glances over victims shoulder to gain info like a pin # or password
SCAM - Answers -stingy about giving personal information
check financial info on regular basis
ask for credit reports
maintain careful records
cybersecurity.tamu.edu - Answers -place where aggies can increase skills on cyber
security
privacy for european union - Answers -US companies must do things differently for
security
KBTX - Answers --system they like to use is offline
-business issue
data breach due to click to gov - Answers --small cities
-local gov installs security patches
-exposure started again last year so more must be done
-patching software app not it anymore
, -effects customers with one time payments
family friend - Answers --started working for big company
-started own business to help smaller companies follow standards
-white hack hacker
college station breach - Answers --terminated contract
-signed up with more expensive contract
-need investment since more security means more $
-attackers made money and got 9.1 million on dark web
hospital held for ransom in LA - Answers --paralyzed by hackers
-docs had no patient records for week +
- no email or health records
-demanded millions of dollars/3.6 bitcoin
-FBI involved and docs talked by mouth or fax
-paper writing/transfers
-random and not malicious so coul dbe an employee accident
holding a system for ransome IMPORTANT - Answers --doesn't mean hacker can see
your data, but site is down and you are forced to pay to get it back-
-average demand is $300
-need bizz decision to decide how often to backup
China hacking - Answers --lots of hacking going on in HP and IBM
-know the risk when investing with china
Big4 - Answers -china, russia, N Korea and iran
Estonia - Answers --recovers from massive DDos attack(classic example of denial of
service attack
-attacked in 2007
-bad things clog up ability for someone to view site
-legit users denied service by hackers
-russian hackers mad bc estonia moved bronze structure
-estonia is not very big, high tech
-got bombarded by russia
-ask for NATOs help
-cyber security expert came in to help
Structured Data - Answers --process automated
-use tags on certain things
-standardization on reporting
-standard pieces identifiable by huumans or computers
xBRL - Answers --extensible business reporting language
people.tamu.edu - Answers -authorized A&M user can create website on here, but are
responsible for how website looks
Risk Management - Answers --using strategies to reduce the amount of risk and think
of consequences if something were to go badly
-use a when we get hacked not if we get hacked mindset
-back up everything on system to prepare
white hack hacker - Answers -help test own organizations security by hacking into it.
mitigate - Answers -reduce risk
unsecured computers - Answers -susceptible to malware
intranet - Answers --protected with firewalls
-business network
-local network
-more secure
firewall - Answers -entails specialized hardware and software working together that
ensures that only authorized personnel and employees within a business can use its
Intranet
internet fraud - Answers -any fraudulent activity in an online setting. Internet fraud can
occur through email systems, message boards, chat rooms, or websites.
identity theft - Answers -crime concerning the unlawful practice of assuming another
individual's identity for economic gain, and it is one of the fastest growing crimes in the
United States and Canada.
trojan horse - Answers -certain day, sudden havack
Spyware - Answers -Software that installs itself on a user's system without permission
and gleans personal data and information about the user without their knowledge or
permission
adware - Answers -Software that routinely displays advertising to a computer system
after the software is installed, usually without the user's consent.
spam/junk mail - Answers -abuse of email system.
unsolicited email messages sent to a massive audience.
,reverse phishing/key logging - Answers -when user sign in to. computer, malicious
software covertly records keystrokes
antivirus software - Answers -be aware if package is working well enough to prevent
your machine from virus. Norton McCaffee
brand new code/virus - Answers -hard to stop, but updates are made to protect you
from
what commercial came on a lot during Masters? - Answers -IBM
click fraud - Answers -manipulating the number of times an ad is clicked on to inflate
advertising bills
purchase scam - Answers -merchant doesn't deliver to customer
phishing - Answers --#1 way hackers get into business
-engineered to gain private info by asking over email
computer privacy - Answers -- remain anonymous while using computer system or
network
-people protection
confidentiality privacy - Answers -business protection
shoulder surfing - Answers --type of identity theft
-criminal glances over victims shoulder to gain info like a pin # or password
SCAM - Answers -stingy about giving personal information
check financial info on regular basis
ask for credit reports
maintain careful records
cybersecurity.tamu.edu - Answers -place where aggies can increase skills on cyber
security
privacy for european union - Answers -US companies must do things differently for
security
KBTX - Answers --system they like to use is offline
-business issue
data breach due to click to gov - Answers --small cities
-local gov installs security patches
-exposure started again last year so more must be done
-patching software app not it anymore
, -effects customers with one time payments
family friend - Answers --started working for big company
-started own business to help smaller companies follow standards
-white hack hacker
college station breach - Answers --terminated contract
-signed up with more expensive contract
-need investment since more security means more $
-attackers made money and got 9.1 million on dark web
hospital held for ransom in LA - Answers --paralyzed by hackers
-docs had no patient records for week +
- no email or health records
-demanded millions of dollars/3.6 bitcoin
-FBI involved and docs talked by mouth or fax
-paper writing/transfers
-random and not malicious so coul dbe an employee accident
holding a system for ransome IMPORTANT - Answers --doesn't mean hacker can see
your data, but site is down and you are forced to pay to get it back-
-average demand is $300
-need bizz decision to decide how often to backup
China hacking - Answers --lots of hacking going on in HP and IBM
-know the risk when investing with china
Big4 - Answers -china, russia, N Korea and iran
Estonia - Answers --recovers from massive DDos attack(classic example of denial of
service attack
-attacked in 2007
-bad things clog up ability for someone to view site
-legit users denied service by hackers
-russian hackers mad bc estonia moved bronze structure
-estonia is not very big, high tech
-got bombarded by russia
-ask for NATOs help
-cyber security expert came in to help
Structured Data - Answers --process automated
-use tags on certain things
-standardization on reporting
-standard pieces identifiable by huumans or computers
xBRL - Answers --extensible business reporting language