Exam 10: Information Systems Security
What are the three general sources of security threats?
A security threat is a challenge to the integrity of information systems that arises from one of three sources: human errors and mistakes, computer crime, and natural events and disasters. Human errors and mistakes include accidental problems caused by both employees and nonemployees. Computer crime includes employees and former employees who intentionally destroy data or other system components. It also includes hackers who break into a system and virus and worm writers who infect computer systems. Natural events and disasters include fires, floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature. Problems in this category include not only the initial loss of capability and service, but also losses stemming from actions to recover from the initial problem.
________ are small files that enables a browser to access Web sites without having to sign in every time.
A
What is the basic information that a security policy must stipulate?
At a minimum, a security policy should stipulate:
• What sensitive data the organization will store
• How it will process that data
• Whether data will be shared with other organizations
• How employees and others can obtain copies of data stored about them
• How employees and others can request changes to inaccurate data
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
A denial-of-service attack is launched when a hacker floods a Web server with millions of bogus service requests.
Improper data disclosure and data damage and loss are possible consequences of an SQL injection attack.
Jason attempts to hack into a banking site to steal customer information. He finds the security of the Web site lacking and is able to access the site with ease. Jason is arrested the next day and charged with computer crime. The banking site was able to track Jason's IP address because he had unknowingly attacked a ________.
Which of the following usually happens in a malicious denial-of-service attack?
Which of the following statements is true about the position definitions component of human safeguards?
Which of the following statements is true about biometric identification?
________ involve the people and procedure components of information systems.
Define encryption and explain symmetric and asymmetric encryption for computer systems.
The process of hardening a Web site is a ________ safeguard.
In the context of malware protection, the program code that causes the unwanted actions is called the ________.
Spoofing occurs when a person receives a confidential text message by mistake.
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)