Study sets, textbooks, questions
Upgrade to remove ads
BIS Exam 3 (8)
Terms in this set (38)
What is defined as a set of protections put in place to safeguard information systems and/or data from security threats such as unauthorized access, use, disclosure, disruption, modification, or destruction?
Information security is not just about technology, but also about management and _________ .
In order for you to enter the server room at your office you must have a key to the room, and then you must have a proper user name and password to access the server. All of the student files on the server are encrypted. What is this called?
Defense in depth
Your IT department is adding a firewall to the network. What type of protection is the department adding?
What kind of threat renders a system inoperative or limits its capability to operate?
Denial of service
A system that has been accessed illegally is a victim of ___________.
If a virus is embedded in a legitimate file, they are often called a(n)__________.
What is the term for when a hacker uses an innocent third party to multiply the messages being sent to the intended target, such as a university server?
Who usually perpetrates unauthorized access?
You recently noticed that your personal information has been altered on your university web account. You know that you did not make any changes and the registrar's office has no record of their office making changes. What type of unauthorized access are you a victim of?
What type of unauthorized access consists of simply accessing records or listening to transmissions on a network?
What term is used to refer to someone (or something) pretending to be someone else (or another computer)?
You have received an email from your university IT department stressing that the IT department will NEVER ask you for your username and password to your email account. What type of scheme is the university most likely trying to protect you from?
What is a common tactic hackers use to allow themselves re-access to a system?
When considering security threats it is very important to consider __________ and __________ of the threat on the organization.
Sets with similar terms
ISM 360-Chapter 8 Quiz
ISM - Chapter 8
BIS Test 3
Network Security: Chp. 5 - Access Controls
Sets found in the same folder
MIS-180 exam 4
Other sets by this creator
INS - UNIT 4
INS - UNIT 3
TAX - CH 7
TAX - CH 6
Summarize the five main characteristic of a minority.
Survival rates and loss of life pursuant to the famous Titanic sinking can be said to provide insight into social classes. Among first-class passengers, only 3 percent of women died and no children lost their lives. Among third-class passengers, 45 percent of the women died and 70 percent of children lost their lives. In total, 76 percent of the third class passengers died and 40 percent of first class passengers dies. Based on these passengers, what implications would you draw regarding the impact of social classes? Is it a relevant factor that third-class passengers were restricted to lower decks so they were farther away from the lifeboats than the first-class passengers were? Explain. Support your responses with information from the chapter?
When faced with a friend who is trying to drive under the influence: a. make sure a sober driver follows your friend home b. it's always safe with a bac under .08% c. both a and b d. neither a nor b?
If a sociologist wanted to study high school cliques, what would be the best method for collecting data? Support your choice by giving two benefits of using this method.
Other Quizlet sets
Chapter 5 Musculoskeletal System
PSYC3406: Chapter 16 PD Study Guide mine
Micro Lab Quiz 7
Applications that allow for remote access to computers are particularly susceptible to what kind of attacks due to the fact that they enable hackers to leverage undiscovered or secret methods with the goal of bypassing normal authentication systems?
Your company requires that when employees are not at their desk no documents should be out on the desk and the monitor should not be viewable. What is this called?
Feminist scholars have criticized conceptualizing leisure as activity because:
Connectionless protocol. Does not guarantee delivery. Used for voice and video apps