Preview

Laudon Mis 6ce Ch08

Satisfactory Essays
Open Document
Open Document
13779 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Laudon Mis 6ce Ch08
Management Information Systems, Cdn. 6e (Laudon et al.)
Chapter 8 Securing Information Systems

1) The potential for unauthorized access is usually limited to the communications lines of a network.
Answer: FALSE
Diff: 2 Type: TF Page Ref: 247
AACSB: Use of information technology
CASE: Content
A-level Heading: 8.1 System Vulnerability and Abuse

2) Large public networks, such as the Internet, are less vulnerable than internal networks because they are virtually open to anyone.
Answer: FALSE
Diff: 2 Type: TF Page Ref: v
AACSB: Reflective thinking skills
CASE: Content
A-level Heading: 8.1 System Vulnerability and Abuse

3) Malicious software programs are referred to as badware and include a variety of threats, such as computer viruses, worms, and Trojan horses.
Answer: FALSE
Diff: 2 Type: TF Page Ref: 249
AACSB: Reflective thinking skills
CASE: Content
A-level Heading: 8.1 System Vulnerability and Abuse

4) A computer bacteria is a rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission.
Answer: FALSE
Diff: 2 Type: TF Page Ref: 349
AACSB: Reflective thinking skills
CASE: Content
A-level Heading: 8.1 System Vulnerability and Abuse

5) Web 2.0 applications, such as blogs, wikis, and social networking sites such as Facebook and MySpace, have are not conduits for malware or spyware.
Answer: FALSE
Diff: 2 Type: TF Page Ref: 250
AACSB: Reflective thinking skills
CASE: Content
A-level Heading: 8.1 System Vulnerability and Abuse

6) A Trojan horse is a software program that appears threatening but is really benign.
Answer: FALSE
Diff: 2 Type: TF Page Ref: 250
AACSB: Reflective thinking skills
CASE: Content
A-level Heading: 8.1 System Vulnerability and Abuse

7) Keyloggers record every keystroke made on a computer to steal serial numbers for software, to launch Internet attacks, to gain access to e-mail

You May Also Find These Documents Helpful

  • Good Essays

    I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS305

    • 300 Words
    • 2 Pages

    5. Yes, because they can be exploited and an attacker can create a backdoor into the computer.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Acct 504 Quiz 4

    • 1811 Words
    • 8 Pages

    | The response to a sender's message that allows both the sender and receiver to know that a message was received correctly is: Answer…

    • 1811 Words
    • 8 Pages
    Good Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Trojan horse – A type of malware that cannot self-replicate, and appears to do one action, but instead infects the computer with malicious payloads.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    4. It is a program in which malicious or harmful code is disguised inside some apparently harmless programming or data.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    1. What are the various types of malware? How do worms differ from viruses? Do Trojan…

    • 639 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Hrm 531 Week 9 Final Paper

    • 1773 Words
    • 8 Pages

    This is a strategy that a supervisor can use after training to support training transfer:…

    • 1773 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    Mat 540 Quiz 4

    • 1474 Words
    • 6 Pages

    In a transportation problem, a demand constraint (the amount of product demanded at a given destination) is a less-than-or equal-to constraint (≤).…

    • 1474 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mat 540 Quiz 5

    • 1011 Words
    • 5 Pages

    If we are solving a 0-1 integer programming problem, the constraint x1 ≤ x2 is a conditional constraint.…

    • 1011 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    In the context of arguments in the critical thinking process, what is the term used to refer…

    • 953 Words
    • 10 Pages
    Better Essays