BUS Ch. 11 & 12
Which of these steps has the U.S. recently taken to counter cybercrime?
-Setup a system of voluntary cybersecurity standards. -opened a new center dedicated to managing cyber activity
Most U.S. state laws permit the monitoring of employees through:
Eavesdropping on phone calls, tracking software, and recording computer keystrokes.
M-Commerce is facilitated primarily by:
Mobile or cell phones
In the U.S., the right to free speech:
Must be weighted against the consequences for the community
The practive of using face business emails in toner to trick users into divulging personal data, such as usernames and passwords, is called:
Phishing
Intellectual property refers to:
Protecting one's ideas, concepts, and symbolic creations, prohibiting the downloading of commercial software or video games, and special laws protecting copyrights, patents, and trademarks.
Which of these statements accurately describe hacktivists known as grey hatters?
They seek media attention and profits.
The primary reason that governments try to keep pace with technology is to:
ensure that the public is protected.
Cybersecurity experts recommend including which essential element for an incident-responce plan for cyberattacks?
focus on how to respond to a break, incitement by all functional departments, and support from executive leadership.
The use of robotics in the workplace has increased recently because:
robots are more reliable than people, the cost of robots has decreased, and new collaborative machines have been invented.