COMPUTER ETHICS QUIZ 3

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Negligent insiders

_____ are poorly trained and inadequately managed employees who mean well but have the potential to cause much damage.

2
New cards

Spear-phishing

_____ is the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization.

3
New cards

Hackers

_____ test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.

4
New cards

distributed denial-of-service

A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.

5
New cards

It is true a risk assessment identifies most dangerous threats to a company

A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff. T/F

6
New cards

It is true an intrusion detection system monitors system and network activities etc

An intrusion detection system monitors system and network resources and activities, and notifies the network security when it detects attempts to circumvent the security measures of a networked computer environment. T/F

7
New cards

It is false regarding competitive intelligence

Competitive intelligence is conducted by industrial spies. T/F

8
New cards

Is it true that employees and contract workers must be educated about the importance of security

Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies. T/F

9
New cards

exploit

In computing, a(n) _____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.

10
New cards

U.S. Computer Emergency Readiness Team

The _____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.

11
New cards

reasonable assurance

The concept of _____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

12
New cards

it is true that automated system rules should mirror written policies

Whenever possible, automated system rules should mirror an organization's written policies. T/F

13
New cards

Collusion

The cooperation between an employee of a company and an outsider to commit fraud against the company is called _____.