Chapter 03

Chapter 03 - 03 True/False Indicate whether the statement...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
True/False Indicate whether the statement is true or false. ____ 1. The key difference between laws and ethics is that ethics carry the sanctions of a governing authority and laws do not. ____ 2. The Clipper Chip can be used to monitor or track private communications. ____ 3. HIPAA specifies particular security technologies for each of the security requirements to ensure the privacy of the health-care information. ____ 4. All states have uniform laws and regulations placed on organizational use of computer technology. ____ 5. Thirty-four countries have ratified the European Council Cyber-Crime Convention as of June 2004. ____ 6. The United States has implemented a version of the law called the Database Right, in order to comply with Directive 95/46/EC. ____ 7. The difference between a policy and a law is that ignorance of a law is an acceptable defense. ____ 8. The Association for Computing Machinery and the Information Systems Security Association have the au- thority to banish violators of their ethical standards from practicing their trade. ____ 9. Studies on ethics and computer use reveal that individuals of different nationalities have different perspect- ives; difficulties arise when one nationality’s ethical behavior conflicts with the ethics of another national group. ____ 10. A number of studies have reported that Singapore and Hong Kong are hotbeds of software piracy, ____ 11. Differences in the ethics of computer use are not exclusively international. Differences are found among indi- viduals within the same country and within the same social class, although not within the same company. ____ 12. There are four general causes of unethical and illegal behavior. ____ 13. Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident. ____ 14. The Information Systems Security Association (ISSA) is a nonprofit society of information security profes- sionals whose primary mission is to bring together qualified information security practitioners for information exchange and educational development. ____ 15. The Department of Homeland Security is the only U.S. federal agency charged with the protection of Americ- an information resources and the investigation of threats to, or attacks on, the resources. ____ 16. DHS is made up of three directorates. ____ 17. Established in January 2001, the National InfraGard Program began as a cooperative effort between the FBI’s Cleveland Field Office and local technology professionals. ____ 18. The NSA is responsible for signal intelligence and information system security. ____ 19. The Secret Service is charged with the detection and arrest of any person committing a United States federal offense relating to computer fraud and false identification crimes. ____ 20.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/09/2011 for the course COM 308 taught by Professor E.bautista during the Fall '10 term at St. Leo.

Page1 / 9

Chapter 03 - 03 True/False Indicate whether the statement...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online