IS Exam 3 Ch. 8-10, End of book questions
Wasting time online costs U.S. businesses more than ____________ annually
$85 billion
The Children's Online Privacy Protection Act (COPPA) was passed by congress in Oct. 1998. This act directed at websites catering to children requires site owners to post comprehensive privacy policies and to obtain parental consent before they collect any personal information from children under ____________ years of age
13 years
____________ is a business policy that permits and in some cases encourages, employees to use their own mobile devices to access company computing resources and applications
Bring your own device (BYOD)
____________ is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer system, networks, and storage devices in a manner that preserves the integrity of data gathered so that it is admissible as evidence in a court of law
Computer forensics
Many organizations use a waterfall approach with six phases, including investigation, analysis, design, _____________, integration, and testing and implementation
Construction
___________software can provide a better match to the current work processes of the organization and may provide a potential competitive advantage; however software development can be extremely costly, and it can take months or even years to complete
Custom
____________ involves secretly stealing data in the computer systems of organizations
Data breach
___________is a diagram used to document the process of the current system or to provide a model of a proposed new system
Data flow diagram
____________ is the practice of blending the tasks performed by the development and IT operations groups to enable faster and more reliable software releases
DevOps
The study of designing and postions computer equipment is called ____________
Ergonomics
A ____________ stands guard between an organization internal network and the internet and it limits network access based on the organization's access policy
Firewall
The purpose of the system investigation phase is to ___________
Gain a clear understanding of the specifics of the problem to solve or the opportunity to address
A ____________ instruction detection system contains information about specific attacks and system vulnerabilities and watches for attempts to exploit these vulnerabilities
Knowledge based
___________software is less risky and leads to quicker deployment; however, maintenance and support costs may become expensive
Off the shelf
____________ is a tool used by the NSA and FBI to access the servers of major internet services such as facebook, google, youtube and others to collect the contet of emails, video, photos, file transfers, and live chats
PRISM
The primary tool fro assessing the software marketplace to determine whether existing packages can meet the organization's needs is the ___________
RFI
The concept of ____________ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.
Reasonable assurance
Preventing waste and mistakes involves establishing, implementing, monitoring and ____________ policies and procedures
Reviewing
____________ is the process of assessing security related risks to an organization's computers and networks from both internal and external threats
Risk assessment
A ____________ is a set of programs that enables a user to gain administrative access to the computer without the end user's consent or knowledge
Rootkit
______________ is an agile development framework that uses a team-based approach in order to keep the development effort focused and moving quickly
Scrum
A preliminary evaluation of software packages and vendors begins during the ____________ phase when the two or three strongest contenders are identified
System analysis
A ____________ is a form of malware that fools its victims into think that it is useful software from a legitimate source
Trojan horse
The ____________ imposes limitations on the bulk collection of the telecommunications metadata of U.S. citizens; prohibits large scale indiscriminate data collection and requires the NSA to obtain permission from FISC to access metadata records which are now held by telecommunication companies rather than by the government
USA Freedom Act (2015)
____________ is an exploit in which victim receive a voicemail message telling them to call a phone number or access a website
Vishing
Two primary causes of computer related health problems are a poorly designed ____________ and failure to take regular breaks to stretch the muscles and rest the eyes
Work environment
The overall emphasis of the _____________ phase is on gathering data on the existing system determining the requirement of the new system, considering alternatives within identified constraints and investigating the feasibility of alternative solutions
analysis
A ____________ is someone who attacks a computer system or network for financial gain
cybercriminal
Morals are one's personal beliefs about right and wrong whereas the term ____________ describes standards or codes of behavior expected of an individual by a group to which an individual belongs
ethics
A ____________ is an attack on an information system that takes advantage of a particular system vulnerability
exploit
In the scrum framework, the ____________ is a person who represents the project stakeholders and is responsible for communicating and aligning project priorities between stakeholders and the development team
product owner
Which of the following is not a common computer related mistake a. Programming errors b. Shopping online while at work c. Data entry or data capture erros d. Errors in handling files
shopping online while at work
The __________ phase converts the system design into an operational system by coding and testing software programs, creating and loading data into databases and performing initial program testing
system construction