Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
BIS Exam 3 (8)
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (38)
What is defined as a set of protections put in place to safeguard information systems and/or data from security threats such as unauthorized access, use, disclosure, disruption, modification, or destruction?
information security
Information security is not just about technology, but also about management and _________ .
People
In order for you to enter the server room at your office you must have a key to the room, and then you must have a proper user name and password to access the server. All of the student files on the server are encrypted. What is this called?
Defense in depth
Your IT department is adding a firewall to the network. What type of protection is the department adding?
Network access
What kind of threat renders a system inoperative or limits its capability to operate?
Denial of service
A system that has been accessed illegally is a victim of ___________.
Unauthorized access
If a virus is embedded in a legitimate file, they are often called a(n)__________.
Trojan horse
What is the term for when a hacker uses an innocent third party to multiply the messages being sent to the intended target, such as a university server?
Smurfing
Who usually perpetrates unauthorized access?
Organization Insiders
You recently noticed that your personal information has been altered on your university web account. You know that you did not make any changes and the registrar's office has no record of their office making changes. What type of unauthorized access are you a victim of?
Active
What type of unauthorized access consists of simply accessing records or listening to transmissions on a network?
Passive
What term is used to refer to someone (or something) pretending to be someone else (or another computer)?
Spoofing
You have received an email from your university IT department stressing that the IT department will NEVER ask you for your username and password to your email account. What type of scheme is the university most likely trying to protect you from?
Phishing
What is a common tactic hackers use to allow themselves re-access to a system?
Backdoor
When considering security threats it is very important to consider __________ and __________ of the threat on the organization.
prevalence, impact
Sets with similar terms
ISM 360-Chapter 8 Quiz
25 terms
ISM - Chapter 8
25 terms
BIS Test 3
71 terms
Network Security: Chp. 5 - Access Controls
100 terms
Sets found in the same folder
Chapter 6
38 terms
Chapter 5
38 terms
Chapter 7
56 terms
MIS-180 exam 4
145 terms
Other sets by this creator
INS - UNIT 4
40 terms
INS - UNIT 3
60 terms
TAX - CH 7
37 terms
TAX - CH 6
61 terms
Verified questions
SOCIOLOGY
Summarize the five main characteristic of a minority.
SOCIOLOGY
Survival rates and loss of life pursuant to the famous Titanic sinking can be said to provide insight into social classes. Among first-class passengers, only 3 percent of women died and no children lost their lives. Among third-class passengers, 45 percent of the women died and 70 percent of children lost their lives. In total, 76 percent of the third class passengers died and 40 percent of first class passengers dies. Based on these passengers, what implications would you draw regarding the impact of social classes? Is it a relevant factor that third-class passengers were restricted to lower decks so they were farther away from the lifeboats than the first-class passengers were? Explain. Support your responses with information from the chapter?
SOCIOLOGY
When faced with a friend who is trying to drive under the influence: a. make sure a sober driver follows your friend home b. it's always safe with a bac under .08% c. both a and b d. neither a nor b?
SOCIOLOGY
If a sociologist wanted to study high school cliques, what would be the best method for collecting data? Support your choice by giving two benefits of using this method.
Other Quizlet sets
Chapter 5 Musculoskeletal System
238 terms
PSYC3406: Chapter 16 PD Study Guide mine
39 terms
Respiration
30 terms
Micro Lab Quiz 7
18 terms
Related questions
QUESTION
Applications that allow for remote access to computers are particularly susceptible to what kind of attacks due to the fact that they enable hackers to leverage undiscovered or secret methods with the goal of bypassing normal authentication systems?
QUESTION
Your company requires that when employees are not at their desk no documents should be out on the desk and the monitor should not be viewable. What is this called?
QUESTION
Feminist scholars have criticized conceptualizing leisure as activity because:
QUESTION
Connectionless protocol. Does not guarantee delivery. Used for voice and video apps