Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

MIS 464 End-Term Exam – Comprehensive Study Guide

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
21-03-2025
Written in
2024/2025

MIS 464 End-Term Exam – Comprehensive Study Guide

Institution
Course

Content preview

MIS 464 End-Term Exam –
Comprehensive Study Guide
Julius Caesar's Encryption Technique - Developed by Julius Caesar to secure his
communications.

History of Cybersecurity - Started by Donn B. Parker, leading to checklists in the 70s
and IS management books in the 80s.

Definition of Cybersecurity - Confidentiality: Restricting access to sensitive
information. Integrity: Guarding against improper information modification.
Availability: Ensuring timely and reliable access to data and resources.

Salami Attack - Financial attack taking small, undetectable amounts of money.

Denial of Service (DoS) Attack - Floods targeted host until network or site crashes,
denying access to legitimate users.

Virus - Infects other programs by modifying them to include a version of itself.

Malware - Malicious software.

Law Enforcement and Spam - Law enforcement focuses on spam resulting in
financial losses or breaches to national security or privacy.

Social Link Farming - Creating online profiles with artificial followers, potentially for
accessing information or systems through employees.

Cybercrime Trends - Increasing in frequency.

Wardriving - Identifies vulnerable Wi-Fi networks or exploits free internet access.

Ransomware - Extortion: Threatens to release sensitive information if ransom not
paid. Encryption: Blocks access to critical information until ransom paid. Double
Extortion: Threatens to auction victim's data in criminal markets.

Online Romance Fraud - Not a significant money-making market.

Hack for Hire - Outsourcing risky activities to avoid detection or legal penalties.

Data Brokers - Sell aggregated information for private details. Can buy data from the
US military.

HTTPS - Encrypts connection, but does not prevent malware, spying, or site
identification.

Algorithm Publication - Widely accepted for transparency and testing.

, Cryptosystem Vulnerabilities - Brute force attacks ineffective; focus on coding errors
or back doors.

Open Source Code - Favored by many for transparency and collaboration.

Vendor Code Publication - Risks are high when vendor does not publish their code.

Cybersecurity Governance Failures - Lack of resources, systematic planning, and
understanding of the company's business.

Company-wide Engagement - Ensure all departments, like marketing and PR,
prioritize cybersecurity.

Essential Practices for Board of Directors - Place infosec on the board's agenda,
identify infosec leader, ensure support, and assign infosec to a key committee.

NIST SP 800-53 - Recommends security controls for federal information systems,
categorizes security controls, and provides benefits beyond public agency adoption.

Security Planning - Objective: Improve information system resources, provides
overview of security requirements, delineates responsibilities and expected behavior
of system users.

Entity Relationship Modeling - Data modeling technique introduced by Peter Chan,
used to visualize and design database structure.

Agile Development - Aims to increase speed and allow flexible changes in software
development process. Stated reason: Minimize steps and bureaucracy. Real reason:
Make software cheaper and faster due to global competition.

Security Requirements Analysis Methods - Serve as communication tools among
users, management, and requirements engineers, easier to use for communication
purposes.

Integration of Security into Development - CISO must ensure security integration into
software or system development from outset.

Communication Challenges - Key reason for failure is communication problems
between non-cybersecurity personnel.

Good Cybersecurity Policy - Necessary foundation of organization's information
security.

Cybersecurity Policies - Communicative document, normative document, corporate
level outlines organization's cybersecurity actions, employee level guides employees
on information security, technical level policies are access control model policies.

Bell-LaPadula Model - Formal security model ensuring confidentiality, developed by
David Bell and Leonard LaPadula.

Written for

Course

Document information

Uploaded on
March 21, 2025
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$7.39
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
InsightPapers

Get to know the seller

Seller avatar
InsightPapers Havard School
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
1 year
Number of followers
0
Documents
489
Last sold
4 months ago
edutech papers shop selling study exams elaborations :

High-quality exams and answers, summaries, exam guides, and practice questions created for top-performing students. Perfect for boosting your grades and preparing efficiently—organized by course and institution.

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions