Chapter 12: Information Security Management
Multiple Choice
1) Which of the following is an example of a security threat resulting from malicious human activity?
A) an employee who misunderstands operating procedures
B) an employee who accidentally deletes customer records
C) an employee who inadvertently installs an old database on top of the current one
D) an employee who intentionally destroys data or other system components
Answer: D
Page Ref: 282
Difficulty: Easy
AACSB: Use of IT
Study Question: Study Question 1
2) A person calls the Draper residence and pretends to represent a credit card company. He asks Mrs. Draper to confirm her credit card number. This is an example of ________.
A) hacking …show more content…
For example, humans can inadvertently shut down a Web server or corporate gateway router by starting a computationally intensive application. An OLAP application that uses the operational DBMS can consume so many DBMS resources that order-entry transactions cannot get through. Denial-of-service attacks can be launched maliciously. A malicious hacker can flood a Web server, for example, with millions of bogus service requests that so occupy the server that it cannot service legitimate requests. Computer worms can infiltrate a network with so much artificial traffic that legitimate traffic cannot get through. Finally, natural disasters may cause systems to fail, resulting in denial of service.
Page Ref: 284
Difficulty: Easy
AACSB: Use of IT
Study Question: Study Question 1
3) Discuss in brief the pros and cons of biometric authentication.
Answer: Biometric authentication uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users. Biometric authentication provides strong authentication, but the required equipment is expensive. Often, too, users resist biometric identification because they feel it is invasive. Biometric authentication is in the early stages of adoption. Because of its strength, it likely will see increased usage in the future. It is also likely that legislators will pass laws governing the use, storage, and protection requirements for biometric data.
Page Ref: 287-288
Difficulty: Easy
AACSB: Use of IT
Study Question: Study Question