Ch. 8 Study Guide
According to the 2016 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2015?
15 billion
According to Ponemon Institute's 2015 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for companies in the United States was approximately:
15 million
Which of the following defines acceptable uses of a firm's information resources and computing equipment?
An AUP
Which of the following statements about wireless security is not true?
Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
Which of the following is not an example of a computer used as an instrument of crime?
Breaching the confidentiality of protected computerized data
Computer forensics tasks include all of the following except
Collecting physical evidence (finger prints)
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
Controls
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack
DDoS
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
Data security
________ is malware that hijacks a user's computer and demands payment in return for giving back access
Ransomeware
Which of the following statements about Internet security is not true?
VoIP is more secure than the switched voice network.
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?
War driving
Evil twins are
bogus wireless network access points that look legit
Application controls:
can be classified as input controls, processing controls, and output controls.
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:
click-fraud
A foreign country attempting to access government networks in order to disable a national power grid is an example of:
cyber warfare
Most common evidence
The Sarbanes-Oxley Act:
imposes responsibility on companies and management to safeguard the accuracy of financial information.
Which of the following statements about botnets is not true?
it is not possible to make a cell phone part of a botnet
is malware that logs and transmits everything a user types
keylogger
Pharming involves:
redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.
The Gramm-Leach-Bliley Act:
requires financial institutions to ensure the security of customer data.
Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called:
social engineering