Preview

Testbacksecurity

Good Essays
Open Document
Open Document
2284 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Testbacksecurity
Chapter 2 - Why Security is Needed

TRUE/FALSE

1. Information security’s primary mission is to ensure that systems and their contents retain their confidentiality at all costs.

ANS: F PTS: 1

2. Information security safeguards the technology assets in use at the organization.

ANS: T PTS: 1

3. A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.

ANS: T PTS: 1

4. An act of theft performed by a hacker falls into the category of “theft,” but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of “forces of nature.”

ANS: F PTS: 1

5. Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA.

ANS: F PTS: 1

6. A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.

ANS: T PTS: 1

7. A worm requires that another program is running before it can begin functioning.

ANS: F PTS: 1

8. A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.

ANS: T PTS: 1

9. Attacks conducted by scripts are usually unpredictable.

ANS: F PTS: 1

10. Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.

ANS: T PTS: 1

11. With the removal of copyright protection, software can be easily distributed and installed.

ANS: T PTS: 1

12. Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people.

ANS: T PTS: 1

13. Much human error or failure can be prevented with training and ongoing awareness activities.

ANS: T PTS: 1

14. Compared to Web site defacement, vandalism

You May Also Find These Documents Helpful

  • Satisfactory Essays

    13) What worm was released in 2001 and primarily defaced web sites? C) Code Red…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    True or False: A computer worm consists of segments of code that perform malicious actions.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A worm, like a virus is designed to copy itself from one computer to another, but it does so automatically. First, it takes control of many features on the computer that can transport files or information. A great danger that exists is that worms have the ability to replicate in great volume. For example, a worm could send out many copies of itself to everyone listed in your e-mail address book, and their computers would then do the same, which causes a domino effect of heavy network traffic that can slow down business networks and the Internet as a whole. These new worms clog networks and possibly cause a long wait for you or anyone else to view web pages on the internet. A worm generally spreads without user action and distributes complete copies of it across networks. A worm virus can consume memory or network bandwidth, which can cause a computer to crash immediately. Because worms don 't need to travel via a host program or file, they can also tunnel into your system and allow somebody else to take control of your computer remotely also knowing as hacking.…

    • 1274 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    In the 1990’s, Kevin Mitnick, aka Condor, was the most-wanted hacker in America. He got his start at the early age of 12, using a workaround to the L.A. transit punch card system. Condor’s notoriety increased after gaining his first successful unauthorized access to a computer network in 1979. His actions give him the title of hacker as defined in the course textbook because he has intentionally entered computer systems to which he would otherwise not have access. After spending time on the run for his crimes and in prison, he is now one of the most sought-after consultants in the industry.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    DooDads4Sale.com acknowledges an obligation to ensure appropriate security for all Information Technology data, equipment, and processes in its domain of ownership and control. This obligation is shared, to varying degrees, by every member of the company.…

    • 1111 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Coding Reaction

    • 778 Words
    • 4 Pages

    Personal computers are a main staple of the hacker culture. They are the main way in which hackers can employ the techniques, though other mediums are becoming more prevalent in recent years. In this sense, personal…

    • 778 Words
    • 4 Pages
    Good Essays
  • Good Essays

    * Worms- These are standalone programs whose sole purpose is to replicate and spread themselves to other computers. Their main use is to search for and delete certain files from computers.…

    • 642 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Hacking

    • 1438 Words
    • 6 Pages

    In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives. Hackers who are out to steal…

    • 1438 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Hacking is a illegal break into computer and network systems, according to the negative meaning of the term popularized by the mass media. However, the term is also found in the jargon of at least three major hacker subcultures that are characterized by their distinct historical origin and development and that are centered around different, but partially overlapping, aspects of computers (with different ideas about who may legitimately be called a hacker, see hacker definition controversy). In computer security, which the mass media refer to, it is someone who focuses on security mechanisms. Parts of this subculture see their aim in correcting security problems and hence use the word in a positive sense. This use is contrasted by the different understanding of the word as a person who, in a broad sense, adheres to a spirit of playful cleverness and, in a more specific sense, loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with free software and open source. In a third meaning, the term refers to computer hobbyists who push the limits of their software or hardware.…

    • 1778 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Worms and Trojan Horses

    • 985 Words
    • 4 Pages

    A worm is a program than can make copies of itself from one disk drive to another. It is self contained and can also spread by copying itself using email or another form of transport. Worms can compromise the security systems of computers and can cause damage in the process. Worms sent via email usually comes in the form of a joke program or some type of software. They can cause thousands of dollars in damages. A worm would be a weapon of choice for an electronic attack that could cause widespread economic damage by disrupting and or destroying a large fraction of computers responsible for day to day business said Nicholas Weaver and Vern Paxson, two security researchers who worked on a project “Worst-Case Worm Attacks,” in collaboration with the International Computer Science Institute (ICSI) a non profit research group associated with the University of California at Berkley in 2004.…

    • 985 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Violation of software also known as “Software Piracy” is a worldwide problem. People copy the software for commercial uses or maybe just for personal gain. The software companies have tried many methods to prevent violation of license agreements. They have tried many copy protected schemes and many have failed.…

    • 503 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    History of Firewall

    • 254 Words
    • 2 Pages

    A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to.…

    • 254 Words
    • 2 Pages
    Good Essays