Chapter 9 (Module 3)

Ace your homework & exams now with Quizwiz!

firewall

A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

dot con

A fraud or scam carried out through the Internet is a form of ____.

self encrypting hard drive

A hard drive that uses FDE is often referred to as a(n) ____.

electronic profiling

A marketing activity that can be considered a privacy risk is ____.

opting out

By ____, you instruct companies with whom you do business not to share your personal information with third parties.

electronic profiling

Collecting in-depth information about an individual is known as ____.

backup

Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.

proximity cards

For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.

throw away e-mail addresses

For online shopping, signing up for free offers, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

privacy policy

Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.

email filter

One common way to deal with spam that makes it to your computer is to use a(n) ____.

typosquatting

Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with URLs slightly different from legitimate sites.

certificate authority

Public key encryption utilizes a pair of encryption keys obtained through ____ .

privacy policy

Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.

opt out

Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.

t

T or F: Mobile device management software secures and manages the mobile devices used in an organization.

f

T or F: Pharming ​attacks often increase after the occurrence of large data breaches that expose names and e-mail addresses of individuals, along with the businesses that these individuals patronize.

t

T or F: Public video surveillance systems are often used in conjunction with face recognition technology to try to identify known terrorists and other criminals, to identify criminals when their crimes are caught on tape, and to prevent crimes from occurring.

f

T or F: The most common security protocol used with secure Web pages is Secure Sockets Layer (SSL).

t

T or F: A disaster recovery plan is also called a business continuity plan.

f

T or F: A government database is a collection of data about people that is collected and maintained by private industry.

t

T or F: Most tracking software do not automatically send videos and photos of possible suspects to law enforcement .

t

T or F: Numeric passwords are often called PINs

t

T or F: One advantage of using a biometric access system is its very high accuracy.

t

T or F: Opt-out procedures can be confusing and time consuming, and they do not always work well.

f

T or F: Read a Web site's piracy rules before providing any personal information.

f

T or F: Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.

f

T or F: Semirugged devices are designed to withstand drops onto concrete, extreme temperature variations, and use while being bounced around over rough terrain in a vehicle.

t

T or F: Smartphones are prone to attacks and are known to have OS flaws.

t

T or F: Some electronic tools, such as devices used by individuals to eavesdrop on wireless telephone conversations are illegal for individuals to use.

t

T or F: Spyware is a possible privacy risk.

f

T or F: The hard drives of devices to be disposed of should be destroyed before they are sold or recycled.

f

T or F: The primary function of employee monitoring is to track employee productivity.

f

T or F: To protect hardware from damage due to power fluctuations, it is important for all computer users to use a voltage inverter.

f

T or F: Unintentional encryption can result in huge data losses during or after a natural disaster or a terrorist attack

t

T or F: You can order free credit reports online quickly and easily via the AnnualCreditReport.com Web site.

f

T or f: For an even higher level of security than a scheduled backup, presence backup can be used.

t

T or f: Keystroke logging software can be used to record e-mail messages and documents before they are encrypted.

information privacy

The term ____ refers to the rights of individuals and companies to control how information about them is collected and

security slot

To facilitate using a computer lock, most portable computers today come with a ____—a small opening built into the system unit case designed for computer locks.

disaster recovery plan

To supplement backup procedures, businesses and other organizations should have a(n) ____.

private

Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.

public

When a digitally signed document is received, the recipient's device uses the sender's ____ key to verify the digital signature.

ruggedized devices

____ are designed to withstand much more physical abuse than conventional devices.

access control systems

____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.

video surveillance

____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.

computer monitoring software

____ is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone's computer activity.

system failure

____ refers to the complete malfunction of a computer system.


Related study sets

Classification of Organisms (Taxonomy)

View Set

HMGT 3700- Hotel Operations Test 1 Review

View Set

Massachusetts License Law and Regulations

View Set