Chapter 9 Flashcards

1
Q

A good hacker who focuses on securing and protecting IT systems is called a:

A

White-hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A computer hacker whose activity is aimed at promoting a social or political cause is called a:

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The ethical and moral issues arising from the development and use of info systems is called:

A

Information ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A program that records keystrokes and mouse clicks is called a:

A

Key logger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A device that captures keystrokes on their journey from the keyboard to the motherboard is called a:

A

Hardware key logger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A file deposited on a hard drive by a website containing info about customers and their web activities is called a:

A

Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A program hidden in free downloadable software which tracks online movements, mines the info stores on a computer, etc, is called:

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some of the negative effects of employee monitoring?

A
  • Lower job satisfaction
  • Rise in employee absenteeism
  • Lack of trust between employee and employer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some challenges of information privacy?

A
  • People release info about themselves (credit card purchases, magazine subscriptions)
  • Data storage costs are declining (cheap to keep databases on people)
  • Info processing is becoming faster
  • More accurate profiles of people are created (advances in data analysis techniques)
  • Advances in networking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What prohibits an organization from collecting personal info unless the user agrees to it?

A

Opt-in model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What permits the collection of personal info until the consumer requests that it stops?

A

Opt-out model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Personal Information Protection and Electronic Documents Act is called:

A

PIPEDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are PIPEDA’s 10 guiding principles?

A

1) Accountability (organization is responsible for personal info)
2) Identifying purposes (purpose for which person info is collected must be identified)
3) Consent (consent of the individual is required)
4) Limiting collection (collection of info is limited to what is necessary)
5) Limiting use, disclosure, and retention (personal info cannot be used for any purpose other than what it was identified for)
6) Accuracy (person info must be accurate)
7) Safeguards (personal info shall be protected)
8) Openness (organization should make its policies and practices available)
9) Individual access ( Person should be given access to the information)
10) Challenging compliance (person should be able to address a challenge)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What identifies the rules required to maintain information security?

A

An information security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What details how an organization will implement the information security policies?

A

An information security plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 5 steps to creating an information security plan?

A

1) Develop the info security policies (telling users to log off systems before leaving, never share passwords)
2) Communicate the policies
3) Identify critical info assets and risks
4) Test and reevaluate risks
5) Obtain stakeholder support

17
Q

What actions should be taken to ensure information security?

A

Authentication, prevention and resistance, and detection and response

18
Q

What is a method used for confirming users’ identities?

A

Authentication

19
Q

A technique to gain personal info for the purpose of identity theft is called:

A

Phishing

20
Q

What is it called when a flood of messages are sent to a server in order to crash it?

A

Denial of service (DoS) attack

21
Q

What is it called when a flood of messages are sent to a server from numerous sites in order to crash it?

A

Distributed denial of service (DDoS) attack