Preview

Draper Residence And Pretends To Represent A Credit Card Company.

Powerful Essays
Open Document
Open Document
4641 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Draper Residence And Pretends To Represent A Credit Card Company.
Experiencing MIS, 3e (Kroenke)
Chapter 12: Information Security Management

Multiple Choice

1) Which of the following is an example of a security threat resulting from malicious human activity?
A) an employee who misunderstands operating procedures
B) an employee who accidentally deletes customer records
C) an employee who inadvertently installs an old database on top of the current one
D) an employee who intentionally destroys data or other system components
Answer: D
Page Ref: 282
Difficulty: Easy
AACSB: Use of IT
Study Question: Study Question 1

2) A person calls the Draper residence and pretends to represent a credit card company. He asks Mrs. Draper to confirm her credit card number. This is an example of ________.
A) hacking
…show more content…
For example, humans can inadvertently shut down a Web server or corporate gateway router by starting a computationally intensive application. An OLAP application that uses the operational DBMS can consume so many DBMS resources that order-entry transactions cannot get through. Denial-of-service attacks can be launched maliciously. A malicious hacker can flood a Web server, for example, with millions of bogus service requests that so occupy the server that it cannot service legitimate requests. Computer worms can infiltrate a network with so much artificial traffic that legitimate traffic cannot get through. Finally, natural disasters may cause systems to fail, resulting in denial of service.
Page Ref: 284
Difficulty: Easy
AACSB: Use of IT
Study Question: Study Question 1
3) Discuss in brief the pros and cons of biometric authentication.
Answer: Biometric authentication uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users. Biometric authentication provides strong authentication, but the required equipment is expensive. Often, too, users resist biometric identification because they feel it is invasive. Biometric authentication is in the early stages of adoption. Because of its strength, it likely will see increased usage in the future. It is also likely that legislators will pass laws governing the use, storage, and protection requirements for biometric data.
Page Ref: 287-288
Difficulty: Easy
AACSB: Use of IT
Study Question: Study Question

You May Also Find These Documents Helpful

  • Satisfactory Essays

    9) Where is the most likely place a database management system would run? B) Server…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    7. Which of the following is any weakness in a system that makes it possible for a threat to cause it harm?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Experiencing problems with the web site is the most prominent signs that a database, attack that can occur. The attack on a computer hosts are often zombie computers with broadband connections to the internet threat have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and direct the attack, often through a botnet/dosnet. Launching a DoS attack can have a negative impact on the business of an organization. The result of the attacker can lead to a loss of reputation along with economic losses. A successful DoS (Denial of Service) attack can disable computers and subsequently, an entire network. An attack launched by a moderately configured system can crash PCs that are of high value. The following steps should be followed when conducting a DoS penetration test: 1) Test heavy loads on the sever; 2) Check for systems and devices vulnerable…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    Denial-of-service DoS attacks DoS attack is simply to send more traffic to a network address than the programmers who planned its data buffers anticipated someone might send. The attacker may be aware that the target system has a weakness that can be exploited or the attacker may simply try the attack in case it might work. According to AppliCure Technologies preventing Denial of Service Attack With dotDefender web application firewall you can avoid DoS attacks because dotDefender inspects your HTTP traffic and checks their packets against rules such as to allow or deny protocols, ports, or IP addresses to stop web applications from being exploited…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    4. As much as 80% of all incidents are a result of internal attacks. List four inappropriate usages from users.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT2580 Final Study Guide

    • 1423 Words
    • 6 Pages

    7. Which of the following is any weakness in a system that makes it possible for a threat to cause it harm? (Page 96)…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 946 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Denial of services is an attack on networks that are intended at making computer or particular service on a computer unavailable.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    4. As much as 80% of all incidents are a result of internal attacks. List four inappropriate usages from users.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 2 Assessment

    • 264 Words
    • 1 Page

    12) Which of the following best describes the term “attack surface”? B) All possible vulnerabilities that could be exploited.…

    • 264 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The use of biometric data has created some security concerns. Biometric data is an array of information stemming from minimally non-invasive such as a fingerprint or iris scan to invasive such as a blood sample, taken to collect DNA. This data is not only very personal, but a single biometric can obtain a subjects biographical data, such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States and unique identifying numbers (i.e. driver’s license number). If one were willing to give their data to be used by the government, they want to ensure their information is protected. How can you convince someone that their information is secure and unable to become compromised? The most efficient way to protect biometric data from unauthorized users is encryption.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The Future Of Criminology

    • 2252 Words
    • 6 Pages

    After the attacks on 9/11 the government discovered America was not truly prepared for anything. America lacked the technology and resources to stop terrorist’s attacks. Suddenly, the United States government became acutely aware that it didn’t know exactly who was passing in and out of the country. After 9/11, the U.S. Congress decided we must have some way of securing our borders. What did the government do to try to protect the nation? They looked into security measures such as biometrics. “Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. Biometrics measure individual's unique physical or behavioral characteristics to recognize or authenticate their identity. Common physical biometrics include fingerprints, hand or palm geometry, retina, iris, and facial characteristics. Behavioral characters characteristics include signature, voice, keystroke pattern, and gait. Of this class of biometrics, technologies for signature and voice are the most developed” (Biometric Security Technology, n.d.). Today, our identities are verified almost exclusively by things that you carry with you and things you remember. Driver’s licenses…

    • 2252 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Tutorial

    • 341 Words
    • 2 Pages

    6. Consider a program that allows consumers to order products from the web. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?…

    • 341 Words
    • 2 Pages
    Satisfactory Essays