Deck 4: Ethics Information Security: MIS Business Concerns
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/333
Play
Full screen (f)
Deck 4: Ethics Information Security: MIS Business Concerns
1
Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
False
Explanation: Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
Explanation: Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
2
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
False
Explanation: The organization that owns the email system can operate the system as openly or as privately as they wish.They own all the users email content and can view it at any time.
Explanation: The organization that owns the email system can operate the system as openly or as privately as they wish.They own all the users email content and can view it at any time.
3
A patent is the legal protection afforded an expression of an idea,such as a song,book,or video game.
False
Explanation: Copyright is the legal protection afforded an expression of an idea,such as a song,book,or video game.
Explanation: Copyright is the legal protection afforded an expression of an idea,such as a song,book,or video game.
4
An acceptable use policy (AUP)requires a user to agree to follow it to be provided access to corporate email,information systems,and the Internet.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
5
Counterfeit software is the unauthorized use,duplication,distribution,or sale of copyrighted software.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
6
Ethics and security are two fundamental building blocks for all organizations.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
7
Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
8
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
9
Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
10
Pirated software is software that is manufactured to look like the real thing and sold as such.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
11
Information management examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data/information required to function and grow effectively.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
12
Privacy is the legal protection afforded an expression of an idea,such as a song,book,or video game.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
13
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
14
Copyright is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
15
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
16
Information governance is a method or system of government for information management or control.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
17
Information compliance is the act of conforming,acquiescing,or yielding information.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
18
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
19
Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
20
Digital rights management is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
21
Employee monitoring policies explicitly state how,when,and where the company monitors its employees.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
22
BYOD policies offer four basic options,including unlimited access for personal devices,access only to nonsensitive systems and data,access,but with IT control over personal devices,apps,and stored data,access,but preventing local storage of data on personal devices.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
23
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
24
Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
25
Click-fraud is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
26
A user can opt in to receive emails by choosing to allow permissions to incoming emails.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
27
Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
28
Cybervandalism includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
29
Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
30
Different organizations and countries have their own terms for these concerns.The United Kingdom terms it "Data Protection," and the European Union calls it "Personal Data Privacy"; the Organization for Economic Co-operation and Development (OECD)has written Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
31
Bring your own device (BYOD)is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
32
Cybervandalism is the electronic defacing of an existing website.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
33
Bring your own device (BYOD)is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
34
Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
35
Internet governance is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
36
Website name stealing is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
37
A user can opt out of receiving emails by choosing to deny permission to incoming emails.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
38
A social media policy outlines the corporate guidelines or principles governing employee online communications.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
39
Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
40
An ethical computer use policy contains general principles to guide computer user behavior.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
41
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
42
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
43
The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
44
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
45
A social media manager is a person within the organization who is trusted to monitor,contribute,filter,and guide the social media presence of a company,individual,product,or brand.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
46
A user can opt out to receive emails by choosing to allow permissions to incoming emails.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
47
Spyware is software that,while purporting to serve some useful function and often fulfilling that functions,also allows Internet advertisers to display advertisements without the consent of the computer user.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
48
Cyberbullying is a person within the organization who is trusted to monitor,contribute,filter,and guide the social media presence of a company,individual,product,or brand.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
49
A user can opt in of receiving emails by choosing to deny permission to incoming emails.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
50
Ransomware is a form of malicious software that infects your computer and asks for money.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
51
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
52
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
53
Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
54
Social media monitoring is the process of monitoring and responding to what is being said about a company,individual,product,or brand.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
55
A social media manager refers to the process of monitoring and responding to what is being said about a company,individual,product,or brand.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
56
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
57
Cyberbullying is an act or object that poses a danger to assets.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
58
Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
59
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
60
A hacker weapon called a splog (spam blog)is a fake blog created solely to raise the search engine rank of affiliated websites.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
61
Denial-of-service attack (DoS)floods a website with so many requests for service that it slows down or crashes the site.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
62
A worm is a form of malicious software that infects your computer and asks for money.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
63
Backdoor programs change their form as they propagate.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
64
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
65
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
66
Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
67
Backdoor programs open a way into the network for future attacks.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
68
The three primary information security areas are 1)authentication and authorization,2)policies and rewards,and 3)detection and response.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
69
Worm spreads itself,not only from file to file,but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something,such as an executable file,to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
70
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
71
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
72
Through social engineering,hackers use their social skills to trick people into revealing access credentials or other valuable information.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
73
Script kiddies have criminal intent when hacking.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
74
Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
75
Organizations address security risks through two lines of defense.The first is people and the second is technology.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
76
Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
77
Information security policies detail how an organization will implement the information security plan.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
78
Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
79
Through pretexting,hackers use their social skills to trick people into revealing access credentials or other valuable information.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck
80
A worm spreads itself not only from file to file but also from computer to computer.
Unlock Deck
Unlock for access to all 333 flashcards in this deck.
Unlock Deck
k this deck