Exam 8: Securing Information Systems
Three major concerns of system builders and users are disaster,security,and human error.Of the three,which do you think is most difficult to deal with? Why?
Student answers will vary.Example answers are: Disaster might be the most difficult because it is unexpected,broad-based,and frequently life threatening.In addition,the company cannot know if the disaster plan will work until a disaster occurs,and then it's too late to make corrections.Security might be the most difficult because it is an ongoing problem,new viruses are devised constantly,and hackers get smarter every day.Furthermore,damage done by a trusted employee from inside cannot be obviated by system security measures.Human error might be most difficult because it isn't caught until too late,and the consequences may be disastrous.Also,administrative error can occur at any level and through any operation or procedure in the company.
________ use scanning software to look for known problems such as bad passwords,the removal of important files,security attacks in progress,and system administration errors.
B
________ refers to all of the methods,policies,and organizational procedures that ensure the safety of the organization's assets,the accuracy and reliability of its accounting records,and operational adherence to management standards.
E
Smartphones have the same security flaws as other Internet-connected devices.
The communications lines in a client/server environment are specifically vulnerable to
The intentional defacement or destruction of a Web site is called
Social networking sites have become a new conduit for malware because
Which of the following is not an example of a computer used as an instrument of crime?
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access,change,or destruction while they are in use or in storage.
In a client/server environment,corporate servers are specifically vulnerable to
An authentication system in which a user must provide two types of identification,such as a bank card and PIN,is called
________ is malware that logs and transmits everything a user types.
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up.This is an example of
As discussed in the Chapter opening case,magnetic stripes are an old technology that is vulnerable to counterfeit and theft.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)