Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Business Driven Information Systems Study Set 1
Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 281
Multiple Choice
What is spear phishing?
Question 282
Multiple Choice
Which policy contains general principles regarding information privacy?
Question 283
True/False
Identity theft is the forging of someone's identity for the purpose of frauD.
Question 284
Multiple Choice
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
Question 285
True/False
Phishing reroutes requests for legitimate websites to false websites.
Question 286
Multiple Choice
What is an insider?
Question 287
Multiple Choice
What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?
Question 288
True/False
Cryptography is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.
Question 289
True/False
Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.