Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
M Information Systems
Quiz 4: Ethics Information Security: MIS Business Concerns
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 321
Short Answer
An information security ___________ details how an organization will implement the information security policies.
Question 322
Short Answer
There are three areas where technology can aid in the defense against attacks.Area one which is at the people level includes authentication and _____________________.
Question 323
Essay
Describe the relationships and differences between hackers and viruses.
Question 324
Short Answer
___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.
Question 325
Short Answer
___________ is a method for confirming users' identities.
Question 326
Short Answer
Identify theft is the forging of someone's identity for the purpose of __________.
Question 327
Short Answer
A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
Question 328
Essay
Identify the six epolicies organizations should implement to protect themselves.
Question 329
Short Answer
A digital _____________ is a data file that identifies individuals or organizations online and is comparable to a digital signature.
Question 330
Short Answer
There are two means of stealing an identity.One is ____________,which reroutes requests for legitimate websites to false websites.
Question 331
Short Answer
Organizations address security risks through two lines of defense;the first is __________,and the second is technology.
Question 332
Short Answer
Within the third area of detection and response,an __________ detection software features full-time monitoring tools that search for patterns in network traffic to identify intruders.
Question 333
Essay
Explain the ethical issues in the use of information technology.
Question 334
Short Answer
The most common type of defense within detection and response technologies is _________ software.
Question 335
Short Answer
Content ____________ occurs when organizations use software that filters content,such as emails,to prevent the accidental or malicious transmission of unauthorized information.
Question 336
Short Answer
Included in the information security policy,managers should consider including virus protection,which includes how often the system should be scanned and how frequently the software should be __________.