Securing Information Systems
50 questions available
Questions
According to the opening case study, what was a primary security failure that led to the 2012 LinkedIn password breach?
View answer and explanationWhat is the term for the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?
View answer and explanationWhat distinguishes a computer worm from a computer virus?
View answer and explanationWhat is the term for a software program that appears to be benign but then does something other than expected, often introducing malicious code?
View answer and explanationAccording to Symantec's 2012 report, how many new and unique threats from malicious software were detected in 2011?
View answer and explanationWhat is the primary purpose of a Denial-of-Service (DoS) attack?
View answer and explanationWhich U.S. law, passed after the Enron and WorldCom scandals, imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information?
View answer and explanationWhat is the scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in a court of law called?
View answer and explanationIn the context of information systems controls, what is the primary function of general controls?
View answer and explanationBased on the sample risk assessment for an online order processing system in Table 8.5, which risk has the highest expected annual loss?
View answer and explanationWhat defines acceptable uses of a firm's information resources and computing equipment, including computers, wireless devices, and the Internet?
View answer and explanationWhat is the primary function of a firewall in a corporate network?
View answer and explanationWhich technology for securing wireless networks replaces the older WEP standard with stronger security using longer, dynamically changing keys?
View answer and explanationWhat is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and intended receiver?
View answer and explanationWhat is a key difference between symmetric key encryption and public key encryption?
View answer and explanationWhat is the primary purpose of a digital certificate in a Public Key Infrastructure (PKI)?
View answer and explanationWhat is the primary goal of fault-tolerant computer systems?
View answer and explanationAccording to the Ponemon Institute's study mentioned on page 333, what was the approximate cost per compromised customer record for data breaches in the U.S. in 2011?
View answer and explanationWhat is the practice of tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information called?
View answer and explanationThe Stuxnet worm, a primary example of cyberwarfare discussed in the chapter, was specifically designed to target what type of system?
View answer and explanationWhat does a business continuity plan focus on?
View answer and explanationWhat type of biometric authentication involves technology that is now being equipped in many PC laptops and mobile devices?
View answer and explanationWhat is the primary vulnerability of systems that are constantly connected to the Internet via cable modem or DSL?
View answer and explanationIn 2011, the second annual Cost of Cyber Crime Study by the Ponemon Institute found the median annualized cost of cyber crime for organizations was what amount?
View answer and explanationWhat kind of systems contain redundant hardware, software, and power supply components to provide continuous, uninterrupted service?
View answer and explanationThe MWEB Business case study illustrates a security breach that occurred because hackers gained access to what system?
View answer and explanationWhat is the primary cause of software vulnerability according to the textbook?
View answer and explanationWhat term is used for small pieces of software created by vendors to repair flaws in their programs without disturbing the proper operation of the software?
View answer and explanationAccording to the case study on Information Security Threats in Europe, what is a botnet?
View answer and explanationWhat type of firewall technology examines the application content of packets and uses a proxy server to handle communication between internal and external users?
View answer and explanationThe Grum botnet, once the world's third-largest, was reportedly responsible for what percentage of worldwide spam traffic before it was shut down in 2012?
View answer and explanationWhich of the following is an example of a general control?
View answer and explanationWhat is a 'hot site' in the context of disaster recovery planning?
View answer and explanationThe median annualized cost of cyber crime for the organizations in the 2011 Ponemon Institute study was:
View answer and explanationWhat type of malware did Symantec identify as having 351 browser vulnerabilities in 2011?
View answer and explanationWhich of these is NOT a principal source of poor system performance?
View answer and explanationWhat is the primary function of an intrusion detection system?
View answer and explanationWhat percentage of responding organizations in the 2011 Computer Security Institute survey experienced a computer security incident within the past year?
View answer and explanationWhat is the most common type of attack experienced by organizations, according to the 2011 Computer Security Institute survey?
View answer and explanationWhich law outlines medical security and privacy rules and procedures for simplifying the administration of health care billing?
View answer and explanationThe chapter discusses a new networking approach where control functions are managed by a central program, separate from the network devices. What is this approach called?
View answer and explanationWhat is the purpose of a MIS audit?
View answer and explanationHow many days did the e-mail disruption for BlackBerry users last in October 2011?
View answer and explanationWhat is the primary method used by the Zeus Trojan to steal financial and personal data?
View answer and explanationWhat is the term for a wireless network that pretends to be a trustworthy Wi-Fi connection to capture users' passwords or credit card numbers?
View answer and explanationWhat is the primary security concern with cloud computing discussed in the chapter?
View answer and explanationIn the context of the MWEB Business case study, how many attacks does MWEB claim to repel daily?
View answer and explanationWhat kind of information systems control is a software control?
View answer and explanationWhat is the primary function of deep packet inspection (DPI)?
View answer and explanationIn the Sony data breach of April 2011, how many users had their personal information, including credit and bank account numbers, compromised?
View answer and explanation