click below
click below
Normal Size Small Size show me how
MIS Exam 3 Chapter 8
L&L Chapter 8
Question | Answer |
---|---|
What is Malware? | Malicious software programs |
What is a Virus? | A software program that attaches itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions |
What is a Worm? | Independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs |
What is a Trojan Horse? | A software program that appears legitimate but contains a second hidden function that may cause damage |
What is a Computer Crime? | Any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution |
What is a Hacker? | An individual who intends to gain unauthorized access to a computer system |
What is Click Fraud? | Occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase. |
What is Cyberterrorism? | The use of computer and networking technologies against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals |
What is Cyberwar? | An organized attempt by a country’s military to disrupt or destroy the information and communications systems of another country |
What is HIPAA? | Outlines medical security and privacy rules and procedures |
What is the Gramm-Leach-Bliley Act of 1999? | Requires financial institutions to ensure the security and confidentiality of customer data |
What is the Sarbanes-Oxley Act of 2002? | Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally |
What is a Security Policy? | Outlines how the company is going to protect its assets |
What is an Acceptable Use Policy? | Defines acceptable use of the firm's information resources and computing equipment as well as the consequences for noncompliance |
What is Authentication? | The ability of each party in a transaction to ascertain the identity of the other party |
What is a Token? | A small physical device designed to prove the identity of a single user |
What are Smart Cards? | A small device that contains a chip formatted with access permission and other data |
What is Biometric Authentication? | Based on the measurement of a physical or behavioral trait that makes each individual unique |
What is a Firewall? | A combination of hardware and software that prevents unauthorized users from accessing private networks |
What is an Intrusion Detection System? | Full-time monitoring tools placed at the most vulnerable point to protect against suspicious network traffic |
What is an Antivirus Software? | Software designed to detect and eliminate malware from an information system |
What is Encryption? | The process of encoding messages before they enter the network, then decoding at the receiving end |
What is Symmetric Key Encryption? | Both the sender and receiver use the same digital key to encrypt and decrypt messages |
What is Public Key Encryption? | Solves symmetric key encryption problem of having to exchange secret key |
What is a Digital Certificate? | Data file used to establish the identity of users and electronic assets for protection of online transactions |
What are the two methods for encrypting network traffic on the web? | SSL and TLS |