Chapter 5 Smartbook
The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
Child
What was passed to protect minors from accessing inappropriate material on the Internet?
Child Online Protection Act
What is the assurance that messages and information remain available only to those authorized to view them?
Confidentiality
__________ is the assurance that messages and information remain available only to those authorized to view them.
Confidentiality
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
Copyright
__________ is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Copyright
Damaged reputation
Customers, suppliers, banks, business partners
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?
Drive-by hacking
What are the two fundamental blocks on which organizations base their businesses?
Ethics and security
What is software that is manufactured to look like the real thing and sold as such?
counterfeit
_________ software is software that is manufactured to look like the real thing and sold as such.
counterfeit
What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself?
Information ethics
What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
Privacy
Information _________ is the act of conforming, acquiescing, or yielding information.
compliance
Information __________ is a method or system of government for information management or control.
governance
_______ are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
hackers
What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?
patent
A(n) ________ is software written with malicious intent to cause annoyance or damage.
virus
What spreads itself not only from file to file but also from computer to computer?
worm
What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?
Bug bounty program
_________ is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
Adware
________ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Digital
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
Digital rights management
What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?
Ediscovery
Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
Ediscovery Electronic discovery
____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.
Information
What is the act of conforming, acquiescing, or yielding information?
Information compliance
What examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively?
Information management
What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged?
Information property
What category of computer security addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
Information secrecy
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
Intellectual property
Revenue
Lost future revenue, billing losses, investment losses, lost productivity
What is software that is intended to damage or disable computers and computer systems?
Malware
___________ is software that is intended to damage or disable computers and computer systems.
Malware
_________ software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
Pirated
___________ is a form of malicious software that infects your computer and asks for money.
Ransomware
Financial performance
Revenue recognition, cash flow, credit rating, stock price
What is designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software?
Scareware
Other expenses
Temporary employees, equipment rentals, overtime costs, travel expenses, legal obligations
A(n) _________ is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
patent
Information ___________ examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
management
_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
privacy
Information _________ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
property
Intellectual ___________ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
property
_________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
spyware