Chapter 9
Chapter 9
Chapter 9
Chapter 9
Chapter 9
100
software that attempts to block unwanted e-mail.
What is a spam filter
100
a computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without the user’s knowledge or permission
What is a virus
100
Discarding old software and even complete computer systems when they still have value Building and maintaining complex systems that are never used to their fullest extent Using corporate time and technology for personal use
What are examples of computer waste
100
Illegal access and use Data alteration and destruction Information and equipment theft Software and Internet piracy Computer-related scams International computer crime
What are categories of crime
100
Parasitic computer programs that replicate but do not infect other computer program files
What is a worm
200
involves the use of social skills to get computer users to provide information to access an information system or its data
What is social engineering
200
program is a malicious program that disguises itself as a useful application or game and purposefully does something the user does not expect
What is Trojan horse
200
Failure by users to follow proper procedures Unclear expectations and a lack of feedback Program development that contains errors Incorrect data entry by data-entry clerk
What are causes of computer-related mistakes
200
Gains unauthorized use or illegal access to computer systems
What is a cracker or criminal hacker
200
Small program hidden in a network or a computer system that records identification numbers and passwords
What is a password sniffer
300
involves going through the trash cans of an organization to find secret or confidential information, including information needed to access an information system or its data.
What is Dumpster diving
300
a modified version of a virus that is produced by the virus’s author or another person who amends the original virus code
What is a variant
300
The hazardous activities associated with these unfavorable conditions are collectively referred to as
What is work stressors
300
Employee who compromises corporate systems
What is an insider
300
The act of unauthorized copying or distribution of copyrighted software
What is software piracy
400
person who enjoys computer technology and spends time learning and using computer systems
What is a hacker
400
the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them
What is Ergonomics
400
Financial fraud, followed by virus attacks
What is The leading cause of financial loss from computer incidents
400
Runs in the background to protect your computer from dangers lurking on the Internet and other possible sources of infected files
What is an anti-virus program
400
The process of converting an original electronic message into a form that can be understood only by the intended recipients
What is Encryption
500
someone who intimidates or coerces a government or organization to advance his political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them
What is cyberterrorist
500
monitors system and network resources and notifies network security personnel when it senses a possible intrusion
What is intrusion detection system
500
refers to software that provides a comprehensive display on a single computer screen of all the vital data related to an organization’s security defenses including threats, exposures, policy compliance and incident alerts.
What is a security dashboard
500
Software installed on a personal computer to: Intercept or take partial control over the user’s interaction with the computer without knowledge or permission of the user
What is spyware
500
List two ways to protect your computer from criminal hackers
What is Install strong user authentication and encryption capabilities on your firewall Install the latest security patches Disable guest accounts and null user accounts Turn audit trails on
M
e
n
u