Chapter 8
Which of the following outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data?
HIIPA Act
If your doctor shares your medical records without your permission, this is considered a ________________ violation.
HIPAA
Which of the following mandates that financial services firms ensure security and confidentiality of customer data?
Sarbanes-Oxley Act
In this video, Agent Macey explains how a _____ pretends to be a legitimate company and sends emails requesting users to update their confidential information such as passwords or account numbers.
spoofer
According to information provided in this video, any business with an online presence is at risk of all of the following EXCEPT _____.
poor customer service
What is Secure Hypertext Transfer Protocol?
A protocol for encrypting data individual messages transferred over the internet
Which of the following best describes pharming?
redirecting users to a phony webpage, even when the correct URL is typed in
According to Agent Macey, the single largest threat to the Internet is _____.
denial-of-service-attacks
Which of the following involves botnets deliberately moving through online ads and leads to higher marketing costs?
Click Fraud
Based on the information provided in this video, which of the following usually happens in a denial-of-service attack?
a hacker floods a web server with so many requests that it becomes unavailable to intended users
Using a combination of hardware and software, _______ are able to control incoming and outgoing data on a network.
firewalls
________ check for data entering a system for accuracy and completeness, such as when a clerk confirms a telephone number for a new customer.
input controls
Application controls can be classified as _____ controls, _______controls, and ________ controls.
input; processing; output
According to Agent Macey, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by _____ through their point-of-sale systems.
malware