Exam 9: Privacy, Security, and Ethics
Describe how information about individuals is collected and compiled.
Information about individuals is collected and compiled through various methods and sources. This can include personal interviews, surveys, questionnaires, and observations. Additionally, data can be gathered from public records, social media profiles, and online activity. Once collected, this information is compiled and organized into databases or files for analysis and use. This can be done manually or through automated processes, depending on the scale and complexity of the data. It is important to note that the collection and compilation of personal information should be done in accordance with privacy laws and ethical guidelines to ensure the protection of individuals' rights and confidentiality.
Using publicly available databases,information resellers create ________ and sell them to direct marketers,fund-raisers,and others.
C
Describe spyware and computer monitoring software.
Spyware and computer monitoring software are types of programs that can be used to track and record the activities of a user on a computer without their knowledge or consent.
Spyware is a type of malicious software (malware) that is designed to gather information about a person or organization without their knowledge. It can collect various types of data, such as internet browsing habits, user logins, and personal information. Spyware can be installed on a computer through deceptive means, such as through a virus or as part of a seemingly legitimate program. Once installed, it can be difficult to detect and remove. Spyware can lead to privacy violations and can also be used for identity theft or fraud.
Computer monitoring software, on the other hand, can be either legitimate or malicious. Legitimate monitoring software is often used by businesses to monitor employee computer use, enforce security policies, and protect against unauthorized data access. Parents might also use this type of software to supervise their children's online activities. These programs can track internet usage, capture keystrokes, take screenshots, and send reports to the person conducting the monitoring.
Malicious computer monitoring software, similar to spyware, is used without the user's consent and can be used for nefarious purposes. It can be installed by someone with physical access to a computer or remotely by exploiting security vulnerabilities.
Both spyware and computer monitoring software can pose significant risks to users' privacy and security. It is important for individuals and organizations to use reputable security software to protect against unauthorized monitoring and to be cautious when downloading and installing new programs.
________ is representing some other person's work and ideas as your own without giving credit to the original source.
Which of the following is the most widely used wireless network encryption for home wireless networks?
Which of the following is not a measure to protect computer security?
Which among the following is a way to shut down an ISP or website?
Computer security is concerned with protecting information,hardware,and software from unauthorized use,as well as preventing or limiting the damage from intrusions,sabotage,and natural disasters.
Posting personal information such as your birth date,family member names,and home address,does not increase your risk of identity theft.
________,a privacy issue,relates to the responsibility of controlling who is able to use data.
Free computer games and free screen saver programs are typical carriers of ________.
As a security buffer,all electronic communications coming into and leaving a corporation must be evaluated by the ________.
________ scanning devices use fingerprints and iris scanners to identify individuals.
A tracking cookie is generally used by an advertising company affiliated with a website you have visited to keep track of your web activity as you move from one site to the next.
A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
Information systems consist of people,procedures,software,hardware,data,and the Internet.
It is highly likely that each one of us has an electronic profile created by information resellers.
The use of the Internet,smartphones,or other devices to send or post content intended to hurt or embarrass another person.
The essential element that controls how computers are used is a law.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)