Morley Chapter 04: Network and Internet Security

Size: px
Start display at page:

Download "Morley Chapter 04: Network and Internet Security"

Transcription

1 Morley Chapter 04: Network and Internet Security 36. Computer crime is sometimes referred to as. a. hacking b. cybercrime c. cyberstalking d. spoofing 37. To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called. a. cybercrime protocols b. codes of conduct c. anithacking rules d. school rules 38. refers to the act of breaking into a computer or network. a. Spamming b. Phishing c. Hacking d. Spoofing 39. According to a recent study, the total cost per data breach in is $5.4 million the highest of any country. a. India b. China c. Russia d. the United States 40. Advocates of state that, unless individuals or businesses protect their access points, they are welcoming others to use them. a. spoofing b. phishing c. spamming d. war driving 41. The term refers to accessing someone else s unsecured Wi-Fi network from the hacker s current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business). a. war driving b. Wi-Fi piggybacking c. Wi-Fi worming d. denial of service 42., the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual. a. Usernames b. PINs c. Passwords d. Codes 43. access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems. a. Touch object b. Possessed object c. Two-factor d. Biometric 44. Increasingly, USB security keys, also called USB security USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features are being used. a. botherders b. botnets c. passes d. tokens

2 45. identify users by a particular unique biological characteristic. a. Possessed object access systems b. Password access systems c. Possessed knowledge access systems d. Biometric access systems 46. A is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access. a. Trojan horse b. firewall c. hub d. bridge 47. uses a single secret key to both encrypt and decrypt the file or message. a. Private key encryption b. Asymmetric key encryption c. Public key encryption d. Synchronous key encryption 48. Some Web-based encrypted systems such as the popular free service require both the sender and recipient to have accounts through that system. a. CryptMail b. Quietmail c. Hushmail d. Privat 49. A provides a secure private tunnel from the user s computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network. a. laptop private network b. USB private network c. tunnel private network d. virtual private network 50. software can control which devices can be connected to an employee s computer. a. Data-leakage prevention b. Device authentication c. Professional firewall d. Network quarantine 51. includes any acts of malicious destruction to a computer or computer resource. a. Phishing attacks b. Blocking attacks c. Computer sabotage d. Spoofing attacks 52. A computer that is controlled by a hacker or other computer criminal is referred to as a. a. spider b. server c. client d. bot 53. is a generic term that refers to any type of malicious software. a. Spamware b. Malware c. Spyware d. Badware 54. A computer is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to. a. phish b. virus c. bot d. link 55. Like a computer virus, a is a malicious program designed to cause damage.

3 a. computer worm b. scam c. phish d. computer bug 56. A is a malicious program that masquerades as something else usually as some type of application program. a. Trojan horse b. computer worm c. computer insect d. computer bug 57. A computer spreads by creating copies of its code and sending those copies to other computers via a network. a. virus b. software c. worm d. hacker 58. One emerging type of Trojan horse is called a -Access Trojan. a. Demote b. Remote c. Control d. Hacker 59. Antivirus programs are usually set up to automatically download new from their associated Web site on a regular basis. a. threat definitions b. viruses c. fraud tips d. virus reports 60. A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as. a. e-cons b. e-scams c. dot frauds d. dot cons 61. occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities usually to buy products or services in that person s name. a. Data theft b. Information theft c. Identity theft d. Database theft 62. can be extremely distressing for victims, can take years to straighten out, and can be very expensive. a. Spams b. Identity theft c. Remote access d. Software theft 63. Phishing schemes may use a technique called, which is setting up spoofed Web sites with addresses slightly different from legitimate sites. a. typosquatting b. spamming c. DoS attacks d. identity theft 64. is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities. a. Framing b. Fishing c. Pharming d. Farming

4 65. The best protection against many dot cons is. a. contacting your ISP b. updating the operating system c. installing an antivirus program d. common sense 66. When a digitally signed document is received, the recipient s computer uses the sender s key to verify the digital signature. a. private b. public c. organizational d. token 68. Repeated threats or other harassment carried out online between adults is referred to as. a. cyberstalking b. computer sabotage c. cyberterrorism d. phishing 69. The, implemented in 2001, grants federal authorities expanded surveillance and intelligencegathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications. a. Sarbanes-Oxley Act b. USA Patriot Act c. Identity Theft and Assumption Deterrence Act of 1998 d. No Electronic Theft (NET) Act 70. The includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies. a. Heath Insurance Portability and Accountability Act (HIPAA) b. PROTECT Act c. Homeland Security Act of 2002 d. National Information Infrastructure Protection Act Morley Chapter 05: Computer Security and Privacy 36. Our networked society has raised a number of concerns. a. privacy b. patent c. hardware theft d. software quality 38. Although many of us may prefer not to think about it, the complete malfunction of a computer system and other types of computer-related disasters do happen. a. software piracy b. interrupted power c. spikes d. system failure 39. To facilitate using a computer lock, nearly all computers today come with a a small opening built into the system unit case designed for computer locks. a. security slot b. cable anchor c. security opening d. user lock

5 40. can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object. a. Surge suppressors b. Password locks c. Spike suppressors d. Cable locks 41. systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction. a. USB b. RFID c. IDC d. FDE 42. The data on the USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN. a. encrypted b. locked c. registered d. indexed 43. Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its. a. recycle b. recovery c. repair d. running 44. devices are designed to withstand much more physical abuse than conventional devices. a. Secured b. Ruggedized c. Malleable d. Flexible 45. Laptop protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag. a. pads b. sleeves c. pillows d. cushions 46. are designed to withstand falls from three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle. a. Malleable b. Rugged c. Semirugged d. Flexible

6 47. Users who want their desktop computers to remain powered up when the electricity goes off should use a(n), as shown in the accompanying figure. a. UPS b. surge suppressor c. voltage controller d. voltage meter 48. are small programs that take care of software-specific problems, or bugs, such as security holes. a. Backups b. Applets c. Scripts d. Patches 49. To supplement backup procedures, businesses and other organizations should have a(n). a. insurance plan b. continuation rule c. disaster recovery plan d. survival guide 50. Creating a means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy. a. mirror b. hotspot c. hot file d. backup 51. A(n) is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business s operations going. a. buddy site b. alternate pad c. hot site d. white room 52. To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every. a. 7 to 10 years b. 10 years c. 10 to 12 years d. 12 years 53. The term refers to the rights of individuals and companies to control how information about them is collected and used. a. information privacy b. information security c. information piracy d. digital Counterfeiting 54. are used for marketing purposes, such as sending advertisements that fit each individual s interests or trying to sign people up over the phone for some type of service.

7 a. Government databases b. Marketing databases c. Educational databases d. Research databases 55. A marketing activity that can be considered a privacy risk is. a. security threads b. watermarking c. electronic profiling d. microprinting 56. Collecting in-depth information about an individual is known as. a. personal databasing b. identity theft c. information piracy d. electronic profiling 57. Most businesses and Web sites that collect personal information have a(n) that discloses how the personal information you provide will be used. a. piracy policy b. security policy c. identity policy d. privacy policy 58. When spam is sent via IM it is called. a. spoof b. phish c. spim d. junk 59. For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk , use a disposable or. a. junkie address b. throw-away address c. one-use address d. second-hand address 60. One common way to deal with spam that makes it to your computer is to use a(n). a. filter b. spam address c. encryption scheme d. hot site 61. By, you instruct companies you do business with that they cannot share your personal data with third parties. a. signing piracy agreements b. opting out c. contracting legal help d. ing them 62. To means to request that you be included in marketing activities or that your information be shared with other companies. a. filter b. opt in c. opt out d. share accept 63. is used specifically for the purpose of recording keystrokes or otherwise monitoring someone s computer activity. a. Surveillance software b. Video software c. Computer monitoring software d. Audio software 64. is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.

8 a. Computer monitoring b. Computer surveillance c. Multimedia surveillance d. Video surveillance 65. cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities. a. Computer monitoring b. Computer surveillance c. Multimedia surveillance d. Video surveillance 66. refers to companies recording or observing the actions of employees while on the job. a. Computer monitoring b. Video surveillance c. Employee monitoring d. Identity theft 67. For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of. a. proximity cards b. presence technology c. face recognition d. video cards 68. refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status. a. Presence technology b. Computer monitoring c. Digital surveillance d. Detection technology 69. programs can be used to detect and remove some types of illegal computer monitoring and spyware software. a. Antivirus software b. Antispyware software c. Antispoof software d. Antiphish software Morley Chapter 08: Emerging Technologies 36. A is a pocket-sized device that typically connects to a smartphone or portable computer to enable the device to display an image on a wall. a. pico projector b. mega projector c. 3D projector d. hologram projector 37. One of the key enhancements in the newest Bluetooth specification known as is low energy, which enables small devices to run for years on a single button-sized battery. a. Bluetooth LE b. Bluetooth Smart c. Bluetooth wirless USB d. Bluetooth Gig 38. mobile payments use RFID to facilitate communication between devices, including transferring payment information, receipts, boarding passes, and other information wirelessly between payment terminals and mobile phones. a. Wireless Batch Communication (WBC) b. RF Product Communication (RFPC)

9 c. Near Field Communication (NFC) d. Electronic Product Coding (EPC) 39. Typically, 3D chips are created by layering individual wafers on top of one another with a special machine that uses cameras to align the wafers properly. a. circuit boards b. silicon c. aluminum d. magnetic 40. chips have a special coating that changes its physical state when heat is applied. a. RAM b. PAM c. RPAM d. PRAM 41. A usually projects the image from a mobile device to a display screen built into the glasses via a wireless connection. a. wearable display b. integrated projector c. pico projector d. 3D printer 43. Designed initially for mobile phones and other portable devices, an IMOD screen is essentially a complex mirror that uses light to display images. a. internal b. external c. diffuse d. both a and b 44. To record data, holographic storage systems split the light from a blue laser beam into two beams a beam whose angle determines the address used to store data at that particular location on the storage medium and a signal beam that contains the data. a. reference b. static c. standard d. starting 45. With holographic storage systems, the signal beam passes through a device called a light modulator (SLM), which translates the data s 0s and 1s into a hologram. a. starting b. standard c. spatial d. static 46. Today s holographic storage systems typically consist of a holographic drive and removable recordable holographic discs, with current capacities ranging from 300 GB to GB per cartridge. a. 400 b. 500 c. 600 d Most people agree that nanotechnology involves creating computer components, machines, and other structures that are less than nanometers in size. a. 10 b. 100 c. 1,000 d. 10, The wall of a single-walled carbon nanotube is only one carbon atom thick and the tube diameter is approximately times smaller than a human hair. a. 10 b. 1,000 c. 10,000 d. 100,000

10 49. One recent development in new technology is that can remove contaminants from water sources. a. magnetized particles b. microparticles c. nanofilters d. electroparticles 50. A(n) computer uses light, such as from laser beams or infrared beams, to perform digital computations. a. optical b. digital c. hybrid d. solar 51. While some researchers are working on developing an all-optical computer, others believe that a mix of optical and electronic components, referred to as an computer, may be the best bet for the future. a. electro-optics b. electronic-opto c. opto-electronic d. optics-electro 52. One new improvement to videoconferencing technology to make it more closely mimic a real-time meeting environment is videoconferencing. a. telepresence b. television c. telephoning d. televirtual 53. Power over Ethernet (PoE) allows both power and data to be sent over standard Ethernet cables. a. microwave b. electrical c. magnetized d. radio wave 54. Developed in the late 1990s, Wi-Fi (for wireless fidelity) is a family of wireless networking standards that use the IEEE standard. a b c d The speed and distance of a Wi-Fi network depends on a variety of factors, such as the particular Wi- Fi standard and. a. the number of solid objects between the access point and PC (walls, doors) b. interference from devices using radio frequencies (baby monitors, microwave ovens) c. the hardware being used d. all of the above 56. In general, Wi-Fi is designed for data transfers between feet indoors. a. 10 and 100 b. 500 and 1,000 c. 100 and 300 d. 30 and is one of the Wi-Fi standards most widely used today. a ac b g c n d. all of the above 58. applications that exist in some form today include intelligent agents, expert systems, neural networks, and robotics.

11 a. Deep technology b. Artificial intelligence c. Expert d. Environmental 59. Self-driving cars, like Google's autonomous cars, are essentially. a. neural networks b. robotic cars c. expert systems d. inference engines 60. The Web is a predicted evolution of the current Web in which all Web content is stored in formats that are more easily read by software applications and intelligent agents. a. 5G b. Semantic c. Natural-Language d. Thought-Stream 61. One example of a neural network is a(n) system that uses cameras to inspect objects and make determinations for example, the systems that check products for defects at manufacturing plants. a. telemetry b. vision c. indexing d. robotic 62. When using a(n) system, it is important to realize that its conclusions are based on the data and rules stored in its knowledge base, as well as the information provided by the users. a. decision b. knowledge c. expert d. analysis 63. A(n) network, like the one used by the technology in the accompanying figure, is designed to emulate the brain s pattern-recognition process in order to recognize patterns in data and make more progressive leaps in associations and predictions than conventional computer systems. a. neural b. programming c. code d. inference 64. is the process of connecting the brain with a computer, such as implanting electrodes directly into the brain to restore lost functionality to or facilitate the communications of severely disabled individuals. a. Telebrainage b. BCI c. VeriChip ing d. CIT

12 65. Privacy-rights advocates worry that the could someday be used by the government to track citizens. a. VeriChip b. telemetry mark c. BCI d. electronic medical monitoring device 66. Home monitoring systems designed for the home include. a. home health monitoring systems b. smart door locks c. smart thermostats d. all of the above 67. Telesurgery is a form of robot-assisted surgery, in which a robot controlled by a physician operates on the patient, and which typically uses to give the human surgeon an extremely close view of the surgical area. a. cameras b. microscopes c. bright lights d. magnifying glasses 68. is involved with the development of robotic prosthetic arms that feel, look, and perform like natural arms, which will be used by military personnel who are injured in the line of duty. a. NSF b. DARPA c. NASA d. The W3C 69. An emerging military robotic application is the suit, which is a wearable robotic system designed to give an individual additional physical capabilities and protection. a. exohuman b. exoskeleton c. exophysical d. exobody 70. Telesurgery is typically than normal surgery. a. less invasive b. more precise c. both a and b d. neither a nor b

Chapter 6 Network and Internet Security and Privacy

Chapter 6 Network and Internet Security and Privacy Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal

More information

Chapter 4 Network and Internet Security

Chapter 4 Network and Internet Security Understanding Computers in a Changing Society, 3 rd Edition Chapter 4 Network and Internet Security Learning Objectives Explain why computer users should be concerned about network and Internet security.

More information

Chapter 9 Security and Privacy

Chapter 9 Security and Privacy Chapter 9 Security and Privacy permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Overview This chapter covers: Security

More information

Securing Information Systems

Securing Information Systems Chapter 7 Securing Information Systems 7.1 2007 by Prentice Hall STUDENT OBJECTIVES Analyze why information systems need special protection from destruction, error, and abuse. Assess the business value

More information

CHAPTER 8 SECURING INFORMATION SYSTEMS

CHAPTER 8 SECURING INFORMATION SYSTEMS CHAPTER 8 SECURING INFORMATION SYSTEMS BY: S. SABRAZ NAWAZ SENIOR LECTURER IN MANAGEMENT & IT SEUSL Learning Objectives Why are information systems vulnerable to destruction, error, and abuse? What is

More information

Copyright 2006 Prentice-Hall. All rights reserved. 1

Copyright 2006 Prentice-Hall. All rights reserved. 1 PC Basics CPSC 100 Hardware Software Networking Copyright 2006 Prentice-Hall. All rights reserved. 1 Objectives Identify basic components of a computer (hardware) Gain insight into how computers work (software)

More information

IS Today: Managing in a Digital World 9/17/12

IS Today: Managing in a Digital World 9/17/12 IS Today: Managing in a Digital World Chapter 10 Securing Information Systems Worldwide losses due to software piracy in 2005 exceeded $34 billion. Business Software Alliance, 2006 Accessories for war

More information

Securing Information Systems

Securing Information Systems Chapter 7 Securing Information Systems 7.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES Why are information systems vulnerable to destruction, error, and abuse? What is the business

More information

Chapter 10: Security and Ethical Challenges of E-Business

Chapter 10: Security and Ethical Challenges of E-Business Chapter 10: Security and Ethical Challenges of E-Business Learning Objectives Identify several ethical issues in IT that affect employment, individuality, working condition, privacy, crime health etc.

More information

Discovering Computers Living in a Digital World

Discovering Computers Living in a Digital World Discovering Computers 2010 Living in a Digital World Objectives Overview Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators Describe various types of Internet

More information

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud

More information

Introduction to Information Security Dr. Rick Jerz

Introduction to Information Security Dr. Rick Jerz Introduction to Information Security Dr. Rick Jerz 1 Goals Explain the various types of threats to the security of information Discuss the different categorizations of security technologies and solutions

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

Securing Information Systems

Securing Information Systems Introduction to Information Management IIM, NCKU System Vulnerability and Abuse (1/6) Securing Information Systems Based on Chapter 8 of Laudon and Laudon (2010). Management Information Systems: Managing

More information

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Chapter 12. Information Security Management

Chapter 12. Information Security Management Chapter 12 Information Security Management We Have to Design It for Privacy... and Security. Tension between Maggie and Ajit regarding terminology to use with Dr. Flores. Overly technical communication

More information

Securing Information Systems

Securing Information Systems Chapter 8 Securing Information Systems 8.1 2010 by Pearson LEARNING OBJECTIVES Explain why information systems are vulnerable to destruction, error, and abuse. Assess the business value of security and

More information

Start the Security Walkthrough

Start the Security Walkthrough Start the Security Walkthrough This guide will help you complete your HIPAA security risk analysis and can additionally be used for periodic review. It is based on the methodology used in PrivaPlan Stat

More information

Information Security in Corporation

Information Security in Corporation Information Security in Corporation System Vulnerability and Abuse Software Vulnerability Commercial software contains flaws that create security vulnerabilities. Hidden bugs (program code defects) Zero

More information

4 Information Security

4 Information Security 4 Information Security 1. Identify the five factors that contribute to the increasing vulnerability of information resources, and provide a specific example of each one. 2. Compare and contrast human mistakes

More information

CHAPTER 3. Information Systems: Ethics, Privacy, and Security

CHAPTER 3. Information Systems: Ethics, Privacy, and Security CHAPTER 3 Information Systems: Ethics, Privacy, and Security CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources LEARNING OBJECTIVES n Describe the

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

E-companion. Quiz for IT-knowledge

E-companion. Quiz for IT-knowledge E-companion Quiz for IT-knowledge 1. The is used in combination with other keys to perform shortcuts and special tasks. A) Control (Ctrl) key B) Function key C) Toggle key D) Windows key 2. is the place

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

IT JARGON BUSTERS NETWORKING TERMS

IT JARGON BUSTERS NETWORKING TERMS IT JARGON BUSTERS NETWORKING TERMS WAN Wide Area The WAN is associated with connections over a large area. In most circumstances this is referred to as the Internet connection you will have at home or

More information

God is in the Small Stuff and it all matters. .In the Small Stuff. Security and Ethical Challenges. Introduction to Information Systems Chapter 11

God is in the Small Stuff and it all matters. .In the Small Stuff. Security and Ethical Challenges. Introduction to Information Systems Chapter 11 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise 1 Eleventh Edition 2 Chapter Objectives C h a p t e r 11 Eleventh Edition James A. O Brien Identify several ethical

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 12 1

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 12 1 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Chapter 12 1 IT Ethics, Impacts, and Security Chapter 12 2 Chapter Outline Ethical Issues Impact

More information

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each. Name Date Chapter 10: Security After completion of this chapter, students should be able to: Explain why security is important and describe security threats. Explain social engineering, data wiping, hard

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. CS Chapter 7 Study Guide _ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Throughput, the actual speed of data transfer that is achieved in a

More information

ECDL / ICDL IT Security. Syllabus Version 2.0

ECDL / ICDL IT Security. Syllabus Version 2.0 ECDL / ICDL IT Security Syllabus Version 2.0 Module Goals Purpose This document details the syllabus for the IT Security module. The syllabus describes, through learning outcomes, the knowledge and skills

More information

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable? Introduction Controlling Information Systems When computer systems fail to work as required, firms that depend heavily on them experience a serious loss of business function. M7011 Peter Lo 2005 1 M7011

More information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security

More information

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device

More information

Whitepaper on AuthShield Two Factor Authentication with SAP

Whitepaper on AuthShield Two Factor Authentication with SAP Whitepaper on AuthShield Two Factor Authentication with SAP By AuthShield Labs Pvt. Ltd Table of Contents Table of Contents...2 1.Overview...4 2. Threats to account passwords...5 2.1 Social Engineering

More information

Course Outline (version 2)

Course Outline (version 2) Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students

More information

SECURE USE OF IT Syllabus Version 2.0

SECURE USE OF IT Syllabus Version 2.0 ICDL MODULE SECURE USE OF IT Syllabus Version 2.0 Purpose This document details the syllabus for the Secure Use of IT module. The syllabus describes, through learning outcomes, the knowledge and skills

More information

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture Network Fundamentals Chapter 7: Networking and Security CS10001 Computer Literacy Network Two or more computers connected by hardware or software so that they can communicate with each other Nodes Devices

More information

Computer Technology Flash Card 2

Computer Technology Flash Card 2 Computer Technology Flash Card 2 Mouse An input device that allows the user to manipulate objects on the screen by moving the mouse along the surface of a desk. Data Refers to the symbols that represent

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Lesson 10 Data and Hardware Protection

Lesson 10 Data and Hardware Protection Data and Hardware Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition 1 Objectives Understand types of backups. Select a backup method. Determine a schedule for backing up

More information

Network Security Issues and Cryptography

Network Security Issues and Cryptography Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi

More information

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services. TERMS OF USE A. PLEASE READ THESE TERMS CAREFULLY. YOUR ACCESS TO AND USE OF THE SERVICES ARE SUBJECT TO THESE TERMS. IF YOU DISAGREE OR CANNOT FULLY COMPLY WITH THESE TERMS, DO NOT ATTEMPT TO ACCESS AND/OR

More information

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Is your privacy secure? HIPAA Compliance Workshop September 2008 Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Agenda Have you secured your key operational, competitive and financial

More information

Online Threats. This include human using them!

Online Threats.   This include human using them! Online Threats There are many dangers from using the web (and computer in general). One should watch out for malware, automated programs designed to cause harm to you, your data, and your system. You are

More information

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

Red Flag Regulations

Red Flag Regulations Red Flag Regulations Identity Theft Put In Context Overview of Topics Red Flag Regulations Overview How UM Protects Information What is the Student Workers role in identity theft prevention? What s this

More information

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations 98-367 MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations Which are common symptoms of a virus infection? (Lesson 5 p 135-136) Poor system performance. Unusually low

More information

Table of Contents. User Guide

Table of Contents. User Guide Table of Contents Locate Laptop Laptop Tracking & Data Security 2 Feature: 2 Port Locker Stop Information & File Leaks 3 Feature 3 BitDefender Internet Security Secure Your Every Bit 3 Feature: 3 PROTEGENT

More information

Technology Safety Quick Tips

Technology Safety Quick Tips Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

Introduction to Ethical Hacking. Chapter 1

Introduction to Ethical Hacking. Chapter 1 Introduction to Ethical Hacking Chapter 1 Definition of a Penetration Tester Sometimes called ethical hackers though label is less preferred Pen testers are: People who assess security of a target Specially

More information

The Tension. Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes

The Tension. Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes s10 Security 1 The Tension Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes Security vs. desire of individuals to act anonymously

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 1 Introduction to Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 1 Introduction to Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 1 Introduction to Security Objectives Describe the challenges of securing information Define information security and explain why

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Computing Policies / Procedures

Computing Policies / Procedures (TIEHH) 1207 GILBERT DRIVE * LUBBOCK, TX 79416 * 806-885-4567 (tel) * 806-885-2132 (fax) Computing Policies / Procedures Contents PURPOSE... 2 REVIEW... 2 POLICY/PROCEDURE... 3 1. Acceptable Use Policy...

More information

Electronic Identity Theft and Basic Security

Electronic Identity Theft and Basic Security Electronic Identity Theft and Basic Security Prepared for DACS By Philip Chen CCSP, NSA infosec Professional 10-2-2007 Pchen@hi-link.com Agenda Introduction Examples Effective Security Defenses for Enterprises

More information

Technologies 1ºESO. Unit 2. Hardware and software. Name Nº Class. After having explained page 26 of your book:

Technologies 1ºESO. Unit 2. Hardware and software. Name Nº Class. After having explained page 26 of your book: After having explained page 26 of your book: Make sure you get this concepts right: 1. What is computer science? A computer system collects data, processes it and transmits the information. Computer science

More information

Technology in Action

Technology in Action Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

SHS Annual Information Privacy and Security Training

SHS Annual Information Privacy and Security Training SHS Annual Information Privacy and Security Training Purpose for Training Samaritan Health Services has created the following training to meet the annual regulatory requirements for education related to

More information

Défense In-Depth Security. Samson Oduor - Internet Solutions Kenya Watson Kamanga - Seacom

Défense In-Depth Security. Samson Oduor - Internet Solutions Kenya Watson Kamanga - Seacom Défense In-Depth Security Samson Oduor - Internet Solutions Kenya Watson Kamanga - Seacom Siku Njema! Good Day! 2 Defense In-depth Security Approach SECTION 1 Introductions SECTION 4 Case - Study SECTION

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

PCI Compliance. What is it? Who uses it? Why is it important?

PCI Compliance. What is it? Who uses it? Why is it important? PCI Compliance What is it? Who uses it? Why is it important? Definitions: PCI- Payment Card Industry DSS-Data Security Standard Merchants Anyone who takes a credit card payment 3 rd party processors companies

More information

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014 Ethics and Information Security 10 주차 - 경영정보론 Spring 2014 Ethical issue in using ICT? Learning Outcomes E-policies in an organization relationships and differences between hackers and viruses relationship

More information

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم بنام خدا تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم امنیت بخشی به سیستمهای فناوری اطالعات Securing Information Systems 1 Learning Objectives Describe the business value of security and control.

More information

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law. Thank you for your interest in e-safety, and for teaching safe and responsible Internet use to your students. Educators are invited to access and download i-safe curriculum AT NO CHARGE under the following

More information

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES Top Ten IT Security Risks - 2017 CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES INTRODUCTION IT S ALL CONNECTED IN 2017. All of our Top 10 risks impact both us as consumers and as professionals

More information

HELPFUL TIPS: MOBILE DEVICE SECURITY

HELPFUL TIPS: MOBILE DEVICE SECURITY HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech

More information

HIPAA UPDATE. Michael L. Brody, DPM

HIPAA UPDATE. Michael L. Brody, DPM HIPAA UPDATE Michael L. Brody, DPM Objectives: How to respond to a patient s request for a copy of their records. Understand your responsibilities after you send information out to another doctor, hospital

More information

BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0

BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0 BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1 Version 5.0 March 2009 2.1 Operating System 2.2 File Management 2.1.1 First Steps 2.1.1.1 Start the computer

More information

Data Handling Security Policy

Data Handling Security Policy Data Handling Security Policy May 2018 Newark Orchard School Data Handling Security Policy May 2018 Page 1 Responsibilities for managing IT equipment, removable storage devices and papers, in the office,

More information

MIS 300 Exam 2 Spring 2011

MIS 300 Exam 2 Spring 2011 MIS 300 Exam 2 Spring 2011 Name: Instructions Turn off your cell phone. Close your notes and book. Answer each question by selecting the best response. For True/False questions, select A for and B for.

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 5 Host, Application, and Data Security Objectives List the steps for securing a host computer Define application security Explain

More information

Securing Information Systems

Securing Information Systems Securing Information Systems You re on LinkedIn? Watch Out! Problem: Massive data breach; using old security practices Solution: Initiative to use minimal up-to-date industry practices, for example, salting

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model Abhijit Vitthal Sathe Modern Institute of Business Management, Shivajinagar, Pune 411 005 abhijit_sathe@hotmail.com

More information

ACCEPTABLE USE OF HCHD INTERNET AND SYSTEM

ACCEPTABLE USE OF HCHD INTERNET AND  SYSTEM Page Number: 1 of 6 TITLE: PURPOSE: ACCEPTABLE USE OF HCHD INTERNET AND EMAIL SYSTEM To establish the guidelines for the use of the Harris County Hospital District s Internet and email system. POLICY STATEMENT:

More information

Train employees to avoid inadvertent cyber security breaches

Train employees to avoid inadvertent cyber security breaches Train employees to avoid inadvertent cyber security breaches TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 2 How much do you know about cyber security? Small business owners often lack

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

Guest Wireless Policy

Guest Wireless Policy Effective: April 1, 2016 Last Revised: November 27, 2017 Responsible University Office: Information Technology Services Responsible University Administrator: Chief Information Officer Policy Contact: Deb

More information

Securing Information Systems

Securing Information Systems Securing Information Systems You re on LinkedIn? Watch Out! Problem: Massive data breach; using old security practices Solution: Initiative to use minimal up-to-date industry practices, for example, salting

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville

More information

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) Security Risk Assessment Tool Physical Safeguards Content Version Date:

More information