Deck 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS

ملء الشاشة (f)
exit full mode
سؤال
Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.
سؤال
Which of the following describes confidentiality?

A)the assurance that messages and information are available only to those who are authorized to view them
B)policies and procedures that address the ethical use of computers and Internet usage in the business environment
C)the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D)the principles and standards that guide our behavior toward other people
سؤال
Ethics and security are two fundamental building blocks for all organizations.
سؤال
Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchangeD.
سؤال
Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
سؤال
Pirated software is software that is manufactured to look like the real thing and sold as such.
سؤال
Which of the following describes privacy?

A)the assurance that messages and data are available only to those who are authorized to view them
B)policies and procedures that address the ethical use of computers and Internet usage in the business environment
C)the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D)the principles and standards that guide our behavior toward other people
سؤال
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
سؤال
Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
سؤال
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

A)ethics
B)intellectual property
C)privacy
D)confidentiality
سؤال
Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
سؤال
Which of the following is an example of acting ethically?

A)Individuals copy, use, and distribute software.
B)Employees search organizational databases for sensitive corporate and personal information.
C)Individuals hack into computer systems to steal proprietary information.
D)None of these are examples of acting ethically.
سؤال
Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
سؤال
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
سؤال
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchangeD.
سؤال
Information governance is a method or system of government for information management or control.
سؤال
Information compliance is the act of conforming, acquiescing, or yielding information.
سؤال
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
سؤال
Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.
سؤال
Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
سؤال
Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
سؤال
Cybervandalism is the electronic defacing of an existing website.
سؤال
Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
سؤال
Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.
سؤال
Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
سؤال
Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
سؤال
An ethical computer use policy contains general principles to guide computer user behavior.
سؤال
Teergrubing is an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
سؤال
Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
سؤال
Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
سؤال
BYOD policies offer four basic options, including 1) unlimited access for personal devices, 2) access only to nonsensitive systems and data, 3) access, but with IT control over personal devices, apps, and stored data, and 4) access, but preventing local storage of data on personal devices.
سؤال
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
سؤال
Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
سؤال
An acceptable use policy (AUP) requires a user to agree to follow it in order to be provided access to corporate email, information systems, and the Internet.
سؤال
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
سؤال
Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
سؤال
Cyberbullying is an act or object that poses a danger to assets.
سؤال
Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
سؤال
Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
سؤال
A social media manager refers to the process of monitoring and responding to what is being said about a company, individual, product, or branD.
سؤال
Spyware is software that, while purporting to serve some useful function and often fulfills that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
سؤال
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
سؤال
A user can opt in to receive emails by choosing to deny permission to incoming emails.
سؤال
Ransomware is a form of malicious software that infects your computer and asks for money.
سؤال
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
سؤال
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
سؤال
Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or branD.
سؤال
A user can opt out of receiving emails by choosing to allow permissions to incoming emails.
سؤال
A user can opt out of receiving emails by choosing to deny permission to incoming emails.
سؤال
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
سؤال
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
سؤال
A social media policy outlines the corporate guidelines or principles governing employee online communications.
سؤال
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processeD.
سؤال
Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.
سؤال
A social media manager is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or branD.
سؤال
A user can opt in to receive emails by choosing to allow permissions to incoming emails.
سؤال
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
سؤال
Cyberbullying is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or branD.
سؤال
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
سؤال
Backdoor programs change their form as they propagate.
سؤال
A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.
سؤال
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
سؤال
Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.
سؤال
Script kiddies have criminal intent when hacking.
سؤال
Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.
سؤال
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
سؤال
Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
سؤال
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
سؤال
Through pretexting, hackers use their social skills to trick people into revealing access credentials or other valuable information.
سؤال
A worm is a form of malicious software that infects your computer and asks for money.
سؤال
A worm spreads itself not only from file to file but also from computer to computer.
سؤال
Organizations address security risks through two lines of defense.The first is people and the second is technology.
سؤال
Backdoor programs open a way into the network for future attacks.
سؤال
Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.
سؤال
A worm spreads itself, not only from file to file, but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spreaD.Worms do not need to attach to anything to spread and can tunnel themselves into computers.
سؤال
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
سؤال
Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.
سؤال
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
سؤال
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/331
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
1
Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
False
Explanation: Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
2
A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.
False
Explanation: Copyright is the legal protection afforded an expression of an idea, such as a song, book, or video game.
3
Which of the following describes confidentiality?

A)the assurance that messages and information are available only to those who are authorized to view them
B)policies and procedures that address the ethical use of computers and Internet usage in the business environment
C)the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D)the principles and standards that guide our behavior toward other people
A
Explanation: This is the definition of confidentiality.
4
Ethics and security are two fundamental building blocks for all organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
5
Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchangeD.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
6
Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
7
Pirated software is software that is manufactured to look like the real thing and sold as such.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following describes privacy?

A)the assurance that messages and data are available only to those who are authorized to view them
B)policies and procedures that address the ethical use of computers and Internet usage in the business environment
C)the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D)the principles and standards that guide our behavior toward other people
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
9
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
10
Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

A)ethics
B)intellectual property
C)privacy
D)confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
12
Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is an example of acting ethically?

A)Individuals copy, use, and distribute software.
B)Employees search organizational databases for sensitive corporate and personal information.
C)Individuals hack into computer systems to steal proprietary information.
D)None of these are examples of acting ethically.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
14
Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
16
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchangeD.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
17
Information governance is a method or system of government for information management or control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
18
Information compliance is the act of conforming, acquiescing, or yielding information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
19
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
20
Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
21
Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
22
Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
23
Cybervandalism is the electronic defacing of an existing website.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
24
Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
25
Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
26
Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
27
Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
28
An ethical computer use policy contains general principles to guide computer user behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
29
Teergrubing is an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
30
Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
31
Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
32
BYOD policies offer four basic options, including 1) unlimited access for personal devices, 2) access only to nonsensitive systems and data, 3) access, but with IT control over personal devices, apps, and stored data, and 4) access, but preventing local storage of data on personal devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
33
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
34
Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
35
An acceptable use policy (AUP) requires a user to agree to follow it in order to be provided access to corporate email, information systems, and the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
36
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
37
Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
38
Cyberbullying is an act or object that poses a danger to assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
39
Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
40
Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
41
A social media manager refers to the process of monitoring and responding to what is being said about a company, individual, product, or branD.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
42
Spyware is software that, while purporting to serve some useful function and often fulfills that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
43
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
44
A user can opt in to receive emails by choosing to deny permission to incoming emails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
45
Ransomware is a form of malicious software that infects your computer and asks for money.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
46
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
47
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
48
Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or branD.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
49
A user can opt out of receiving emails by choosing to allow permissions to incoming emails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
50
A user can opt out of receiving emails by choosing to deny permission to incoming emails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
51
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
52
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
53
A social media policy outlines the corporate guidelines or principles governing employee online communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
54
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processeD.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
55
Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
56
A social media manager is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or branD.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
57
A user can opt in to receive emails by choosing to allow permissions to incoming emails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
58
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
59
Cyberbullying is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or branD.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
60
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
61
Backdoor programs change their form as they propagate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
62
A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
63
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
64
Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
65
Script kiddies have criminal intent when hacking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
66
Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
67
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
68
Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
69
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
70
Through pretexting, hackers use their social skills to trick people into revealing access credentials or other valuable information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
71
A worm is a form of malicious software that infects your computer and asks for money.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
72
A worm spreads itself not only from file to file but also from computer to computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
73
Organizations address security risks through two lines of defense.The first is people and the second is technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
74
Backdoor programs open a way into the network for future attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
75
Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
76
A worm spreads itself, not only from file to file, but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spreaD.Worms do not need to attach to anything to spread and can tunnel themselves into computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
77
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
78
Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
79
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
80
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 331 في هذه المجموعة.