1. It is a program that a hacker secretly installs.
2. It is a Trojan horse that executes under specific condition.
3. It is an attack that floods a target site with demands for data and other small tasks.
4. Their objectives are to test limits of systems and gain publicity.
5. It is the primary objective of cyber-criminals.
6. It is a form of hacking but clearly criminal activity.
7. It defines organization’s security requirements and controls and sanctions needed to meet the requirements.
8. It evaluates whether an organization has a well-considered security policy in place and if it is being followed.
9. It provides would-be hackers with fake information about the network.
10. It is the freedom from unauthorized intrusion.
11. The right of individuals to control the collection and use of information about themselves
12. Science of encoding messages where only sender and intended receiver can understand the messages
13. Process of converting electronic messages into a form understood only by the intended recipients
14. Theft of key pieces of personal information to gain access to a person’s financial accounts
15. Attempt to steal personal identity data by tricking users into entering information on a counterfeit Web site
16. Keystroke-logging software that enables the capture of account usernames, passwords, credit card numbers, and other sensitive information
17. Transmission of the same e-mail message to a large number of people
18. It is the set of rules that establishes boundaries of generally accepted behaviour.
19. It is the social convention about right and wrong.
20. It is the set of beliefs about right and wrong behaviour.
21. Habits that incline people to do what is acceptable.
22. It identifies ethical lapses committed in the past.
23. It is a calling that requires specialized knowledge and long and intensive academic preparation.
24. It indicates a professional possesses a particular set of skills, knowledge, or abilities in the opinion of a certifying organization.
25. It is the act of illegally making copies of software.
26. It is a piece of information that is generally not known to the public that is held confidential.
27. It is an effort by an employee of a company to attract the attention of others to a negligent, illegal, unethical, abusive, or dangerous act by the company that threatens the public interest.
28. It is a piece of programming code usually disguised as something else that can cause unexpected and undesirable events.
29. It is the most common and easily created virus created in an application macro language.
30. It is a harmful program that resides in active memory of a computer.
II True or False. For each of the following statement, write TRUE if the statement is correct and FALSE if incorrect.
1. Morality may vary by Age, Cultural group, ethnic background, religion, and gender
2. People with integrity act in accordance with a personal code of principles
3. To protect the organization and its employees from legal action is one of the reasons why fostering good business ethics is important.
4. Good ethics can lead to bad business results
5. Suppliers and other business partners prefer companies that operate in a fair and ethical manner
6. IT workers are liable for malpractice
7. There are many universal code of ethics for IT professionals
8. Confidential business data and private customer information must be safeguarded against malicious acts of theft or disruption.
9. Virus spread itself from computer to computer.
10. Viruses can propagate without human intervention
Walang komento:
Mag-post ng isang Komento