Home
Browse
Create
Search
Log in
Sign up
Upgrade to remove ads
Only $2.99/month
ch 6.
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (15)
Rank the following in terms of dollar value of the crime, from highest to lowest.
cybercrime - white collar crime - robbery
An information system's _____ is the possibility that the system will be harmed by a threat.
vulnerability
Employees in which functional areas of the organization pose particularly grave threats to information security?
human resources, management information systems
involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.
social engineering
A _____ is intellectual work that is known only to a company and is not based on public information.
trade secret
are segments of computer code that attach to existing computer programs and perform malicious acts.
viruses
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.
phishing
Which of the following is (are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?
spamware
is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset
risk analysis
controls are concerned with user identification, and they restrict unauthorized individuals from using information resources.
access
In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved.
white listing;black listing
You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?
The message could be a phishing attack.
Your liability with credit cards is typically _____, whereas your liability with debit cards can be _____.
Zero, the amount in your bank account
You are going on a business trip. Which of the following would be the worst type of card to take?
debit card
Which of the following is the worst, least secure password?
social security
THIS SET IS OFTEN IN FOLDERS WITH...
information systems Ch 2.
10 terms
Ch 3
10 terms
ch 4
10 terms
ch 5
10 terms
OTHER SETS BY THIS CREATOR
HRM REVIEW CH3
21 terms
HRM REVIEW CH2
20 terms
HRM REVIEWCH1
14 terms
ch 2
15 terms