CSIS 3050 Chapter 13
A malicious applet is an instruction in a computer program that triggers a malicious act.
False
A virus is a distinct program that can run unaided.
False
According to the text case, it is reasonably easy for law enforcement to catch "bad guys" on the Internet.
False
Computer monitoring has been criticized as an invasion of employee privacy because it uses video as well as keystroke surveillance.
False
Computer monitoring has been criticized as unethical because it monitors individuals, not just work, and is done continually.
False
Confidential e-mail messages are seldom monitored, although other business communication routinely is.
False
Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems because of their faster download speeds.
False
Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.
False
Most policies specify that company computer workstations and networks are company resources that must be used only for work-related uses.
False
People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as computer trauma disorders (CTDs).
False
Security suites integrate virus protection with firewalls, Web security, and encrypted e-mail.
False
Spyware is annoying, but generally no threat to your privacy.
False
Using office resources, such as networks and computers, to search for side jobs is generally not considered workplace Internet abuse.
False
The stakeholders theory maintains that:
Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
As a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:
Performing your role as a vital human resource in the business systems you help develop and use in your organization
One of the major principles of technology ethics is that the good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk. This principle is:
Proportionality
When managers apply the _____________ theory of ethical decision making, they believe their only responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.
Stockholder
According to the text, all the following are examples of ethical behavior by organizations, except:
Stockholder theory
A hacker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds for private advantage, and does not reveal them either to the general public or to the manufacturer for correction.
True
A sniffer is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or content.
True
According to the text case, about two-thirds of the companies surveyed monitor their Internet connections, but only two states require informing employees that they do so.
True
According to the text, the need for security management is being driven by the increasing threat of cybercrimes and by the growing use of the Internet to link companies with partners and customers.
True
Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints, voice, or other physical trait.
True
Cyber crime is becoming one of the Net's growth businesses.
True
Electronic breaking and entering means getting access to a computer system, reading some files, but neither stealing nor damaging anything.
True
In some systems, the password to read the contents of a file is different from that required to write to a file (change its contents).
True
In the United States, opt-out is the default position, whereas in Europe consumers must opt-in or their personal information cannot be used.
True
Lawsuits by monitored workers against employers are increasing.
True
Most companies don't reveal that they have been targets or victims of computer crime.
True
The most widely used encryption method uses a pair of public and private keys unique to each individual.
True
The use of information technologies is causing a significant reduction in some types of job opportunities.
True
The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.
True
These days, corporate antivirus protection is a centralized function of information technology.
True
According to one survey, 90 percent of U.S. workers admit to surfing recreational sites during office hours.
True....MULTIPLE CHOICE
According to the text, companies are protecting themselves from computer crime by using:
All of the choices are correct
Talking unsuspecting company employees out of valuable information such as passwords is called:
Social engineering
All of the following are AITP standards of professional conduct related to a person's obligation to society except:
Protect the privacy and confidentiality of all information entrusted to me