Chapter 13 Flashcards

1
Q

Ensuring the accuracy, integrity, and safety of
business/IT activities and resources.

A

Security management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Control totals, error signals, backup files, and
security codes are examples.

A

Information system
controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software that can control access and use of a computer system.

A

System security monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A computer system can continue to operate even after a major system failure if it has this capability.

A

Fault tolerant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A computer system that serves as a filter for access to and from other networks by a company’s networked computers

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Laws and regulations focused on issues related
to the Internet and other forms of networked
communications

A

Cyber law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The presence of documentation that allows a
transaction to be traced through all stages of
information processing.

A

Audit traiL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Using your voice or fingerprints to identify yourself electronically.

A

Biometric security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A plan to continue IS operations during an
emergency.

A

Disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scrambling data during its transmission.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ethical choices may result from decision-making
processes, cultural values, or behavioral stages.

A

Ethical foundations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Managers must confront numerous ethical
questions in their businesses.

A

Business ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sending unsolicited e-mail indiscriminately.

A

Spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software that can infect a machine and transmit
private information back to its owner.

A

Spyware/Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two different perspectives on the use of private
information

A

Opt-in/Opt-out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using computers to identify individuals that fit a
certain profile.

A

Computer matchinG

17
Q

Using computers to monitor the activities of
workers.

A

Computer monitoring

18
Q

Overwhelming a Web site with requests for service
from captive computers.

A

Distributed denial of service
(DDOS

19
Q

Using computers and networks to steal money,
services, software, or data.

A

Computer crime

20
Q

Using company computers to access the Internet
during work hours for personal business.

A

. Unauthorized use

21
Q

Unauthorized copying of software.

A

Software piracy

22
Q

. Unauthorized copying of copyrighted material.

A

Intellectual property
theft

23
Q

Electronic breaking and entering into a computer
system

A

. Hacking

24
Q

A program that makes copies of itself and destroys
data and programs.

A

Computer virus

25
Q

Finds and eliminates computer viruses.

A

Antivirus software

26
Q

Sending extremely critical, derogatory, and vulgar
e-mail messages

A

Flaming

27
Q

Designing computer hardware, software, and
workstations that are safe, comfortable, and easy
to use.

A

. Ergonomics

28
Q

Applications of information technology that have
beneficial effects for society at large.

A

Societal solutionS

29
Q

Duplicate files of programs or data that are
periodically copied and stored elsewhere in
case the original is damaged and needs to be
restored.

A

Backup files

30
Q

A piece of data, known only to an authorized user,
that is used to gain access to a system

A

Passwords