Chap013

Chap013 - Chapter 13 - Security and Ethical Challenges...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 13 - Security and Ethical Challenges Chapter 13 Security and Ethical Challenges True / False Questions 1. (p. 516) As a manager or business professional you should manage your work activities and those of others to minimize the detrimental effects of e-business systems and optimize their beneficial effects. TRUE AACSB: Technology Bloom: Knowledge Difficulty: Easy Learning Objective: 1 2. (p. 562) There are underground websites where stolen data are swapped as easily as baseball cards on eBay. TRUE AACSB: Technology Bloom: Knowledge Difficulty: Easy Learning Objective: 1 3. (p. 562) The technical tools to steal credit card numbers and online bank account log-in data are often as valuable as the stolen good themselves. TRUE AACSB: Technology Bloom: Knowledge Difficulty: Easy Learning Objective: 1 13-1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 13 - Security and Ethical Challenges 4. (p. 563) Russia has some of the strictest anti-spamming laws in the world. FALSE Russia has no any anti-spamming laws at the moment. AACSB: Technology Bloom: Knowledge Difficulty: Medium Learning Objective: 1 5. (p. 520) Scheduling work breaks and limiting exposure to computer monitors are examples of ethical behavior by organizations. TRUE AACSB: Technology Bloom: Knowledge Difficulty: Easy Learning Objective: 1 6. (p. 520) Many companies and organizations have established guidelines for ethical conduct, but very few specify that company computer workstations and networks are company resources to be used for work-related uses only. FALSE Most policies specify that company computer workstations and networks are company resources that must be used only for work-related uses. AACSB: Technology Bloom: Knowledge Difficulty: Medium Learning Objective: 1 13-2
Background image of page 2
Chapter 13 - Security and Ethical Challenges 7. (p. 522) Cybercrime is becoming one of the Net's growth businesses. TRUE AACSB: Technology Bloom: Knowledge Difficulty: Easy Learning Objective: 1 13-3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 13 - Security and Ethical Challenges 8. (p. 523) According to the text case, PayPal used sniffer software to catch suspicious user login names. FALSE PayPal used sniffer software to catch suspicious packet traffic. AACSB: Technology Bloom: Knowledge Difficulty: Medium Learning Objective: 2 9. (p. 523) Electronic breaking and entering means getting access to a computer system, reading some files, but neither stealing nor damaging anything. TRUE AACSB: Technology Bloom: Knowledge Difficulty: Medium Learning Objective: 1 10. (p. 524) A malicious applet is an instruction in a computer program that triggers a malicious act. FALSE This is the description of a logic bomb. AACSB: Technology Bloom: Knowledge Difficulty: Medium Learning Objective: 1 13-4
Background image of page 4
11. (p. 524) A sniffer is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or content. TRUE
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/13/2011 for the course IT IT610 taught by Professor Wu during the Spring '11 term at FSU.

Page1 / 37

Chap013 - Chapter 13 - Security and Ethical Challenges...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online