Chapter 13 Flashcards

1
Q

Ensuring the accuracy, integrity, and safety of
business/IT activities and resources.

A

Security management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Control totals, error signals, backup files, and
security codes are examples.

A

Information system
controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software that can control access and use of a computer system.

A

System security monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A computer system can continue to operate even after a major system failure if it has this capability.

A

Fault tolerant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A computer system that serves as a filter for access to and from other networks by a company’s networked computers

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Laws and regulations focused on issues related
to the Internet and other forms of networked
communications

A

Cyber law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The presence of documentation that allows a
transaction to be traced through all stages of
information processing.

A

Audit traiL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Using your voice or fingerprints to identify yourself electronically.

A

Biometric security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A plan to continue IS operations during an
emergency.

A

Disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scrambling data during its transmission.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ethical choices may result from decision-making
processes, cultural values, or behavioral stages.

A

Ethical foundations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Managers must confront numerous ethical
questions in their businesses.

A

Business ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sending unsolicited e-mail indiscriminately.

A

Spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software that can infect a machine and transmit
private information back to its owner.

A

Spyware/Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two different perspectives on the use of private
information

A

Opt-in/Opt-out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using computers to identify individuals that fit a
certain profile.

A

Computer matchinG

17
Q

Using computers to monitor the activities of
workers.

A

Computer monitoring

18
Q

Overwhelming a Web site with requests for service
from captive computers.

A

Distributed denial of service
(DDOS

19
Q

Using computers and networks to steal money,
services, software, or data.

A

Computer crime

20
Q

Using company computers to access the Internet
during work hours for personal business.

A

. Unauthorized use

21
Q

Unauthorized copying of software.

A

Software piracy

22
Q

. Unauthorized copying of copyrighted material.

A

Intellectual property
theft

23
Q

Electronic breaking and entering into a computer
system

24
Q

A program that makes copies of itself and destroys
data and programs.

A

Computer virus

25
Finds and eliminates computer viruses.
Antivirus software
26
Sending extremely critical, derogatory, and vulgar e-mail messages
Flaming
27
Designing computer hardware, software, and workstations that are safe, comfortable, and easy to use.
. Ergonomics
28
Applications of information technology that have beneficial effects for society at large.
Societal solutionS
29
Duplicate files of programs or data that are periodically copied and stored elsewhere in case the original is damaged and needs to be restored.
Backup files
30
A piece of data, known only to an authorized user, that is used to gain access to a system
Passwords