ISYS 363 Ch. 10 Flashcards
A person who breaks into a politician’s website with plans to deface photos and add disturbing text is called a ____________________.
smacker
black hat
hacktivist
red hat
cracktivist
hacktivist
People who break into computer systems out of curiosity or to test security measures are often called ________.
hacktivists
white hats
cracktivists
smackers
black hats
white hats
Many popular movies today portray individuals who steal trade secrets to gain advantages over competitors. This activity is called __________________.
hacktivism
blackmail
technological surveillance
operational espionage
industrial espionage
industrial espionage
One troubling method computer criminals use to steal your passwords is called _________________, which involves collecting every keystroke.
keyboard capture
photo capturing
key recording
brute-force
keylogging
keylogging
A type of malware that appears to be a legitimate program but actually carries a destructive program is called a _____________.
Trojan horse
virus
super worm
worm
superbug
Trojan horse
Which of the following is a type of malware that holds a computer hostage by locking the computer or encrypting the computer’s files?
Ransomware
Trojan horse
Kidnapper
Time bomb
Virus
Ransomware
Which of the following is a type of attack that could prevent the users of a website from being able to use the website?
Spyware
Spam
Adware
Denial of service
Cookies
Denial of service
About 85% of all e-mail spam is sent by one of six major __________, which are destructive software robots working together on a collection of zombie computers.
spy rings
spear phishers
botnets
zombie webs
bot webs
botnets
Which of the following is the stealing of another person’s private information with the intention of executing financial transactions using the victim’s accounts?
Captcha
Botnet
Identity theft
Spyware
Spam
Identity theft
Which of the following is NOT a form of cyberstalking?
Posting incriminating pictures of the victim on social networking sites
Making false accusations that damage the reputation of the victim on blogs, Web sites, chat rooms, or e-commerce sites
Gaining information on a victim by monitoring online activities, accessing databases, and so on
Using LinkedIn to find out where an acquaintance is employed
Encouraging others to harass a victim by posting personal information about the victim on Web sites, chat rooms, or social networking sites
Using LinkedIn to find out where an acquaintance is employed
The illegal practice of using proprietary software that you have not paid for is called _______________, and it costs the software industry billions of dollars a year.
software piracy
software stealing
cyberharrassment
cybersquatting
software plundering
software piracy
Which of the following prevents an individual from including a favorite song without permission in a commercial business presentation?
Copyright laws
Patent protection
Hacking concerns
Federal customs laws
Computer fraud fears
Copyright laws
One part of an organization’s security measures involves ensuring that unauthorized manipulations of data and systems (that may compromise accuracy, completeness, or reliability) are prevented. This is referred to as ________________.
confidentiality
availability
accountability
privacy
integrity
integrity
One important security measure necessary for an organization to create a digital audit trail by ensuring that all actions can be traced is referred to as ________________.
integrity
confidentiality
availability
auditability
accountability
accountability
When an organization provides its employees with policies stating, for instance, whether employees have permission to use Facebook during the day, the organization is providing its _____________ policies.
technology
privacy
acceptable use
copyright
information systems
acceptable use