exam1 study guide ACIS

exam1 study guide ACIS - Exam 1 Study Guide MIS Chapters 1,...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Exam 1 Study Guide MIS Chapters 1, 4, 12 and 13 FrontPage Units A-E Lectures August 25 – September 22 File Management 1. Define: File- a collection of related data records treated as a unit. Sometimes called a data set Folder- named section of a storage medium used to group related files Storage Media- something used to store data?????????????? File Management- controlling the creation deletion access and use of files of data and programs-organizing your files in an efficient way 2. Identify the characteristics of files including: Filename and Extension Location – including Parent and Subfolders Size Various Dates 3. What is the affect of executing each of the following file management functions on the original file and it’s location? Cut- changes location of original file or folder Copy- duplicates original file or folder Delete- erases original file or folder (may be found in recycle bin) Rename- changes name of original file or folder 1. Malware What is a malware? Undesirable software on ones computer Describe the various types of computer attacks and how they work: o Virus- program instructions in a file that reproduce itself, and spread to other files ON THE SAME COMPUTER o Trojan Horse- a program that seems to perform one good function while actually doing something else (bad) o Worm- malware that can spread itself to other computers with minimal user interaction o Denial of Service Attack- a program that controls infected machines and commands them to flood a network with traffic by making numerous unnecessary requests o Spyware- software that gathers info about your online activities and sends it to someone else, it is designed to enhance the effectiveness of targeted advertising; other spyware is designed to support criminal activities. o Phishing- refers to an internet scam that is exactly that-fishing for information- usually personal info such as credit card, bank account, or social security numbers. Usually done through fraud emails from your “bank” o Pharming- designed to harvest identity, financial and other key pieces of info for identity theft. Exploits vulnerability in DNS server software that allows hackers to redirect the domain name for a site to a different IP address 2. Describe various security measures used to protect information systems including: Antivirus- monitors change in file size, monitors change in checksum, search for virus signature- keep it updated! Spyware Detection- Email Filters-
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Operating Systems- Firewalls- software or hardware that creates a protective barrier between your computer and potentially harmful programs on the Internet Security Monitors- Biometrics- fast growing area of computer security, these are security measures provided by computer devices that measure physical traits that make each individual unique including voice verification, fingerprints, hand geometry, signature dynamics, keystroke analysis, retina scanning, face recognition, genetic pattern analysis
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 7

exam1 study guide ACIS - Exam 1 Study Guide MIS Chapters 1,...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online