CSIS 3050 Chapter 13

Ace your homework & exams now with Quizwiz!

A malicious applet is an instruction in a computer program that triggers a malicious act.

False

A virus is a distinct program that can run unaided.

False

According to the text case, it is reasonably easy for law enforcement to catch "bad guys" on the Internet.

False

Computer monitoring has been criticized as an invasion of employee privacy because it uses video as well as keystroke surveillance.

False

Computer monitoring has been criticized as unethical because it monitors individuals, not just work, and is done continually.

False

Confidential e-mail messages are seldom monitored, although other business communication routinely is.

False

Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems because of their faster download speeds.

False

Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.

False

Most policies specify that company computer workstations and networks are company resources that must be used only for work-related uses.

False

People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as computer trauma disorders (CTDs).

False

Security suites integrate virus protection with firewalls, Web security, and encrypted e-mail.

False

Spyware is annoying, but generally no threat to your privacy.

False

Using office resources, such as networks and computers, to search for side jobs is generally not considered workplace Internet abuse.

False

The stakeholders theory maintains that:

Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company

As a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:

Performing your role as a vital human resource in the business systems you help develop and use in your organization

One of the major principles of technology ethics is that the good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk. This principle is:

Proportionality

When managers apply the _____________ theory of ethical decision making, they believe their only responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.

Stockholder

According to the text, all the following are examples of ethical behavior by organizations, except:

Stockholder theory

A hacker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds for private advantage, and does not reveal them either to the general public or to the manufacturer for correction.

True

A sniffer is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or content.

True

According to the text case, about two-thirds of the companies surveyed monitor their Internet connections, but only two states require informing employees that they do so.

True

According to the text, the need for security management is being driven by the increasing threat of cybercrimes and by the growing use of the Internet to link companies with partners and customers.

True

Biometric control devices use special-purpose sensors to measure and digitize a biometric profile of an individual's fingerprints, voice, or other physical trait.

True

Cyber crime is becoming one of the Net's growth businesses.

True

Electronic breaking and entering means getting access to a computer system, reading some files, but neither stealing nor damaging anything.

True

In some systems, the password to read the contents of a file is different from that required to write to a file (change its contents).

True

In the United States, opt-out is the default position, whereas in Europe consumers must opt-in or their personal information cannot be used.

True

Lawsuits by monitored workers against employers are increasing.

True

Most companies don't reveal that they have been targets or victims of computer crime.

True

The most widely used encryption method uses a pair of public and private keys unique to each individual.

True

The use of information technologies is causing a significant reduction in some types of job opportunities.

True

The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.

True

These days, corporate antivirus protection is a centralized function of information technology.

True

According to one survey, 90 percent of U.S. workers admit to surfing recreational sites during office hours.

True....MULTIPLE CHOICE

According to the text, companies are protecting themselves from computer crime by using:

All of the choices are correct

Talking unsuspecting company employees out of valuable information such as passwords is called:

Social engineering

All of the following are AITP standards of professional conduct related to a person's obligation to society except:

Protect the privacy and confidentiality of all information entrusted to me


Related study sets

U.S. History Ch. 16-17 Practice Test

View Set

Risk Assessment and Response to Assessed Risks

View Set

Real Estate, Chapter 8, Lesson Cumulative Quiz

View Set

Chapter 7: Segmentation, Target Marketing and Positioning

View Set

договори та терміни

View Set

World History Final Review pt. 2

View Set