8 define the following types of attacks created by

This preview shows page 3 - 5 out of 5 pages.

8. Define the following types of attacks created by programmers: Trojan horse and logic bomb. 2 points A Trojan horse is a software program containing a hidden function that presents a security risk. A logic bomb is segments of computer code embedded within an organization’s existing computer programs. 9. What is the difference between a virus and a worm? 2 points The difference between a virus and a worm is that a virus needs to infect a program to mask its malicious deeds, while a worm can replicate itself without the need of a program to hide behind. 10. Compare a hot site, a warm site, and a cold site as strategies for business continuity. 5 points A hot site is a fully configured computer facility, with all services, communications links, and physical plant operations. A hot site duplicates computing resources, peripherals, telephone systems, applications, and workstations. A warm site provides many of the same services and options of the hot site. However, a warm site typically does not include the actual applications the company needs. A warm site does include computing equipment such as servers, but it often does not include user workstations. A cold site provides only rudimentary services and facilities, such as a building or room with heating, air conditioning, and humidity control. This type of site provides no computer hardware or user workstations. 11. Define the principle of least privilege. 5 points The principle of least privilege is a principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization. 12. In the context of information security, define threat, exposure, and vulnerability. 3 points As it pertains to information security a threat is any danger to which an information resource may be exposed. Exposure is a harm, loss, or damage that can result if a threat compromises an information security. Vulnerability is the possibility that an information resource will suffer harm by a threat.
Image of page 3

Subscribe to view the full document.

13. Identify 5 factors that are increasing the vulnerability of information resources today. 2 points The five factors that are increasing the vulnerability of information resources today are today’s interconnected, interdependent, wirelessly networked business environment, smaller, faster, cheaper computers and storage devices, decreasing skills necessary to be a computer hacker, international organized crime taking over cybercrime, and finally a lack of management support. Chapter 8 14. Define blogs. 2 points A blog is a personal Web site, open to the public, in which the site creator expresses his or her feelings or opinions with a series of chronological entries. 15. Define wiki. 2 points Wiki is a Web site on which anyone can post material and make changes to other material. 16. What is a mashup? 2 points A mashup is a Web site that takes different content from a number of other Web sites and mixes them together to create a new kind of content. 17. What factors might cause an individual, an employee, or a company to be cautious in the use of social networking? 5 points Some factors that might cause an individual, an employee, or a company to be cautious in the use of social networking could be embarrassing or private information could be disclosed on a social network that was not supposed to be. As an individual you
Image of page 4
Image of page 5

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern