Upgrade to remove ads
Terms in this set (15)
Rank the following in terms of dollar value of the crime, from highest to lowest.
cybercrime - white collar crime - robbery
An information system's _____ is the possibility that the system will be harmed by a threat.
Employees in which functional areas of the organization pose particularly grave threats to information security?
human resources, management information systems
involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.
A _____ is intellectual work that is known only to a company and is not based on public information.
are segments of computer code that attach to existing computer programs and perform malicious acts.
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.
Which of the following is (are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?
is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset
controls are concerned with user identification, and they restrict unauthorized individuals from using information resources.
In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved.
white listing;black listing
You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true?
The message could be a phishing attack.
Your liability with credit cards is typically _____, whereas your liability with debit cards can be _____.
Zero, the amount in your bank account
You are going on a business trip. Which of the following would be the worst type of card to take?
Which of the following is the worst, least secure password?
THIS SET IS OFTEN IN FOLDERS WITH...
information systems Ch 2.
OTHER SETS BY THIS CREATOR
HRM REVIEW CH3
HRM REVIEW CH2