Deck 15: HRIS Privacy and Security

Full screen (f)
exit full mode
Question
______ are best described as people who accesses a computer or computer network unlawfully.

A) Hackers
B) Viruses, worms, and trojans
C) Information thieves
D) Disgruntled employees
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of these is NOT a well-known "worm" threat?

A) Slammer
B) Code Red
C) MyDoom
D) MyPirate
Question
Which of the following is NOT considered a software threat to security?

A) worms
B) spyware
C) trojan virus
D) file corruption
Question
Human error and natural disasters are not considered viable threats to employee privacy and data security.
Question
Which of the following is NOT considered a threat to security?

A) human error
B) disgruntled employees and ex-employees
C) other "internal" attackers
D) none of these
Question
Integrity ensures that information is created and modified in an authorized manner.
Question
Which type of security threat is the most widespread,affecting almost 90% of companies?

A) computer fraud
B) phishing
C) denial of service
D) theft of hardware components, such as storage cards
Question
According to the text,approximately what percentage of employers monitor what employees are posting to external blogs and social networking sites?

A) 25%
B) 30%
C) 75%
D) 100%
Question
Which of the following is NOT a recommended privacy policy statement?

A) Adopt a comprehensive information security and privacy policy.
B) Store sensitive personal data in secure HRIS, and provide appropriate encryption.
C) Dispose of documents properly, or restore persistent storage equipment.
D) Conduct focus groups with selected employees.
Question
Which is NOT a symptom of spyware on an employee's computer?

A) invasion of privacy
B) appropriation of personal information
C) interference with the speed and responsiveness of the computer
D) proliferation of pop-up ads
Question
A hacker is defined as someone who accesses a computer or computer network unlawfully.
Question
Which state has passed a law protecting employee records in private organizations?

A) California
B) Ohio
C) New York
D) Oregon
Question
Phishing is known as the illegal scheme where victims usually receive e-mail messages that appear to come from an authentic source with which the victim does business.
Question
The McCumber Cube for Data Privacy has three dimensions.Which of the following is NOT a dimension that is used to organize a privacy policy?

A) desired information goals
B) countermeasures
C) state of information
D) use of information
Question
Which of the following is not considered a "best practice" that HR managers should consider to secure information security and privacy?

A) Train users on how to securely use and handle the equipment, data, and software.
B) Make backup copies of data files and programs.
C) Do not allow passwords to be shared. Change passwords frequently.
D) Require employees to take sensitive material home with them so that it is not left at the office.
Question
Information security breaches cost approximately ______ annually.

A) $78 million
B) $45 billion
C) $10 billion
D) $100 billion
Question
Which of the following is considered a common security threat?

A) human error
B) damage by employees
C) hackers
D) all of these
Question
Three main goals of information security are to achieve confidentiality,integrity,and availability within an HRIS.
Question
All companies have been affected by computer-based fraud,such as data processing or data entry routines that are modified.
Question
Viruses and trojans are common external security threats to organizations and often come in e-mail attachments.
Question
What is meant by information security in HRIS?
Question
Briefly list and describe the important goals and considerations of information security.
Question
What is the difference between a computer virus and spyware?
Question
What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least five best practices that were discussed in class,as well as in your textbook.
Question
What is meant by phishing?
Question
Describe cyberterrorism and how to at least control its impact.
Question
Describe the McCumber Cube approach to privacy.
Question
There are many threats to information security.Please describe five information security threats.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/28
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: HRIS Privacy and Security
1
______ are best described as people who accesses a computer or computer network unlawfully.

A) Hackers
B) Viruses, worms, and trojans
C) Information thieves
D) Disgruntled employees
A
2
Which of these is NOT a well-known "worm" threat?

A) Slammer
B) Code Red
C) MyDoom
D) MyPirate
D
3
Which of the following is NOT considered a software threat to security?

A) worms
B) spyware
C) trojan virus
D) file corruption
D
4
Human error and natural disasters are not considered viable threats to employee privacy and data security.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT considered a threat to security?

A) human error
B) disgruntled employees and ex-employees
C) other "internal" attackers
D) none of these
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
6
Integrity ensures that information is created and modified in an authorized manner.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
7
Which type of security threat is the most widespread,affecting almost 90% of companies?

A) computer fraud
B) phishing
C) denial of service
D) theft of hardware components, such as storage cards
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
8
According to the text,approximately what percentage of employers monitor what employees are posting to external blogs and social networking sites?

A) 25%
B) 30%
C) 75%
D) 100%
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is NOT a recommended privacy policy statement?

A) Adopt a comprehensive information security and privacy policy.
B) Store sensitive personal data in secure HRIS, and provide appropriate encryption.
C) Dispose of documents properly, or restore persistent storage equipment.
D) Conduct focus groups with selected employees.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
10
Which is NOT a symptom of spyware on an employee's computer?

A) invasion of privacy
B) appropriation of personal information
C) interference with the speed and responsiveness of the computer
D) proliferation of pop-up ads
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
11
A hacker is defined as someone who accesses a computer or computer network unlawfully.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
12
Which state has passed a law protecting employee records in private organizations?

A) California
B) Ohio
C) New York
D) Oregon
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
13
Phishing is known as the illegal scheme where victims usually receive e-mail messages that appear to come from an authentic source with which the victim does business.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
14
The McCumber Cube for Data Privacy has three dimensions.Which of the following is NOT a dimension that is used to organize a privacy policy?

A) desired information goals
B) countermeasures
C) state of information
D) use of information
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is not considered a "best practice" that HR managers should consider to secure information security and privacy?

A) Train users on how to securely use and handle the equipment, data, and software.
B) Make backup copies of data files and programs.
C) Do not allow passwords to be shared. Change passwords frequently.
D) Require employees to take sensitive material home with them so that it is not left at the office.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
16
Information security breaches cost approximately ______ annually.

A) $78 million
B) $45 billion
C) $10 billion
D) $100 billion
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is considered a common security threat?

A) human error
B) damage by employees
C) hackers
D) all of these
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
18
Three main goals of information security are to achieve confidentiality,integrity,and availability within an HRIS.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
19
All companies have been affected by computer-based fraud,such as data processing or data entry routines that are modified.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
20
Viruses and trojans are common external security threats to organizations and often come in e-mail attachments.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
21
What is meant by information security in HRIS?
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
22
Briefly list and describe the important goals and considerations of information security.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
23
What is the difference between a computer virus and spyware?
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
24
What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least five best practices that were discussed in class,as well as in your textbook.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
25
What is meant by phishing?
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
26
Describe cyberterrorism and how to at least control its impact.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
27
Describe the McCumber Cube approach to privacy.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
28
There are many threats to information security.Please describe five information security threats.
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 28 flashcards in this deck.