Exam 8: Securing Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

Free
(True/False)
4.8/5
(28)
Correct Answer:
Verified

True

Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise.List at least five Internet security challenges.

Free
(Essay)
4.7/5
(48)
Correct Answer:
Verified

Large public networks,including the Internet,are more vulnerable because they are virtually open to anyone and because they are so huge that when abuses do occur,they can have an enormously widespread impact.When the Internet becomes part of the corporate network,the organization's information systems can be vulnerable to actions from outsiders.Computers that are constantly connected to the Internet via cable modem or DSL line are more open to penetration by outsiders because they use a fixed Internet address where they can be more easily identified.The fixed Internet address creates the target for hackers.To benefit from electronic commerce,supply chain management,and other digital business processes,companies need to be open to outsiders such as customers,suppliers,and trading partners.Corporate systems must be extended outside the organization so that employees working with wireless and other mobile computing devices can access them.This requires a new security culture and infrastructure,allowing corporations to extend their security policies to include procedures for suppliers and other business partners.

The term "cybervandalism" is the intentional disruption,defacement,or even destruction of a Web site or corporate information system.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

True

Smaller firms can outsource security functions to

(Multiple Choice)
4.7/5
(41)

Application controls are specific controls unique to each computerized application,such as payroll or order processing.

(True/False)
4.7/5
(37)

We are looking at putting antivirus software on all of our business computers.One employee stated that he thought it was a bad idea because he felt that antivirus software is the virus.Does this employee have a point?

(Essay)
4.9/5
(43)

The potential for unauthorized access is usually limited to the communications lines of a network.

(True/False)
4.9/5
(31)

________ uses systems that read and interpret individual human traits,such as fingerprints,irises,and voices,in order to grant or deny access.

(Short Answer)
4.8/5
(35)

Biometric authentication

(Multiple Choice)
4.9/5
(35)

Identity theft is a crime in which an imposter obtains key pieces of personal information,such as social insurance numbers,driver's licence numbers,or credit card numbers,to impersonate someone else.

(True/False)
4.7/5
(41)

Bart Black walks into a local bank.He does not work there but he has a tag on his shirt that reads "IT Department." He goes up to a loans officer and tells him he needs to check the security on the loan officer's computer.Bart sits in front of the keyboard and asks the officer for his username and password.The loan officer gives him the information.Bart then thanks him and leaves the bank.Outside in his car Bart Black gets into the bank system using the information.This loan officer is a victim of ________.

(Multiple Choice)
4.7/5
(35)

________ controls are specific controls unique to each computerized application,such as payroll or order processing.

(Short Answer)
4.9/5
(37)

Sniffers enable hackers to steal proprietary information from anywhere on a network,including e-mail messages,company files,and confidential reports.

(True/False)
4.8/5
(40)

________ refers to the policies,procedures,and technical measures used to prevent unauthorized access,alteration,theft,or physical damage to information systems.

(Short Answer)
4.8/5
(26)

________ involves setting up fake Web sites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.

(Short Answer)
5.0/5
(34)

Hackers and their companion viruses are an increasing problem,especially on the Internet.What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not?

(Essay)
4.8/5
(30)

The term "cracker" is typically used to denote a hacker with criminal intent.

(True/False)
4.8/5
(40)

A ________ is a type of eavesdropping program that monitors information travelling over a network.

(Multiple Choice)
4.9/5
(36)

What is a digital certificate? How does it work?

(Essay)
4.8/5
(34)

An analysis of the firm's most critical systems and the impact a system's outage would have on the business is included in a(n)

(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 202
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)