C communication has shifted from social networks to

This preview shows page 16 - 19 out of 47 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Principles of Information Systems
The document you are viewing contains questions related to this textbook.
Chapter 13 / Exercise 13
Principles of Information Systems
Reynolds/Stair
Expert Verified
c. Communication has shifted from social networks to smartphones. d. Web filtering, user education, and strict policies cannot help prevent IT security dangers on Facebook and other social networks. Answer: A
16
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Principles of Information Systems
The document you are viewing contains questions related to this textbook.
Chapter 13 / Exercise 13
Principles of Information Systems
Reynolds/Stair
Expert Verified
Difficulty: Hard Section Ref: 5.2 Cyberattack Targets and Consequences Learning Objective: Describe the targets of cyberattacks and the impact these attacks have on both public and private sector organizations. AACSB: Reflective thinking 42. When new vulnerabilities are found in operating systems, applications, or wired and wireless networks, vendors of those products release __________ or __________ to fix the vulnerabilities. Difficulty: Medium
Section Ref: 5.2 Cyberattack Targets and Consequences Learning Objective: Describe the targets of cyberattacks and the impact these attacks have on both public and private sector organizations. AACSB: Technology 43. Samuel received an email that looked like it came from his bank. The email told him to click a link that opened an official looking Webpage where he was asked to enter his account information. But when Samuel examined the URL, he noticed it was a strange address he did not recognize. Most likely, someone was attempting to steal Samuel’s confidential information using a technique called __________.
Difficulty: Medium Section Ref: 5.1 The Face and Future of Cyberthreats Learning Objective: Describe the extent of incidents and data breaches in organizations and the sources of cyberthreats that are putting organizations in jeopardy. AACSB: Technology 44. In the United States, the Sarbanes–Oxley Act (SOX) requires businesses to __________________________. 17
Difficulty: Hard
Section Ref: 5.4 Defending Against Fraud Learning Objective: Describe the internal audits and controls that are used to defend against occupational fraud at all levels of an organization. AACSB: Technology 45. The director of the Federal Trade Commission (FTC) bureau of consumer protection warned that the agency would bring enforcement action against small businesses that ________ a. failed to inform the public about network failures in a timely manner b. failed to transmit sensitive data c. did not report security breaches to law enforcement d. lacked adequate policies and procedures to protect consumer data. Answer: D
Difficulty: Hard Section Ref: 5.3 Cyber Risk Management Learning Objective: Explain why cyber risk management must be a top business priority and outline an organizational model for cybersecurity.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture