100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
NDSU MIS 320 Exam 1 questions with correct answers $10.49
Add to cart

Exam (elaborations)

NDSU MIS 320 Exam 1 questions with correct answers

 4 views  0 purchase
  • Course
  • NDSU
  • Institution
  • NDSU

NDSU MIS 320 Exam 1 questions with correct answers Types of Infringement Cybersquatting, typosquatting/cyberpiracy, metatagging, deep linking, framing cybersquatting registration of an infringing domain name, or other internet use of an existing trademark to extort payments typosqu...

[Show more]

Preview 2 out of 6  pages

  • August 27, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • NDSU
  • NDSU
avatar-seller
Pogba119
NDSU MIS 320 Exam 1 questions with
correct answers
Types of Infringement - answer Cybersquatting, typosquatting/cyberpiracy,
metatagging, deep linking, framing

cybersquatting - answer registration of an infringing domain name, or other internet
use of an existing trademark to extort payments

typosquatting/cyberpiracy - answer has intent of diverting traffic from a legitimate site
to an infringing site

metatagging - answer using other's trademarks as metatarsi in HTML code in a
misleading or confusing manner

deep linking - answer bypassing target site's home page and linking directly to
content page

keyboarding - answer using other's trademarks as keywords on search engines in a
misleading or confusing manner

Framing - answer displaying content of another site within a frame or window

E-mail marketing - answer email sent directly to interested consumers who "opt-in"
or have not "opted-out"

Spam - answer unsolicited commercial email

Efforts to control spam - answer technology (filtering software), gov regulation, self-
regulation by industry, volunteer efforts

spyware - answer software that secretly gathers information about users while they
browse the Web, can be maliciously

Adware - answer form of spyware, collects info about the user to display ads

Phishing - answer sending fraudulent email that seem to come from legitimate
sources

keyloggers - answer monitor and record keystrokes

sniffing - answer capturing and recording network traffic, often used by hackers to
intercept info

, spoofing - answer attempt to get info by pretending to be someone you're not

digital divide - answer gap between those people with effective access to
digital/information technology and those without

what are the security dimensions/objectives - answer confidentiality, integrity,
availability, authenticity, nonrepudiation, privacy, blocking

confidentiality - answer data is available to only authorized parties

integrity - answer stored/transmittd information is unaltered

availability - answer ensuring information/services are available

authenticity - answer knowing identities of communicating parties

nonrepudiation - answer parties cannot deny their actions

privacy - answer controlling who has access to and use of information

blocking - answer blocking unwanted information or intrusions

Target scheme steps - answer began with phishing attack on fazio mechanical
services, uploaded point of sale malware, striped data on every card, sent to
compromised holding servers, moved data to other servers, sold data to counterfeiters

what contributes to today's security environment - answer use of public
infrastructure, location, devices, methods, applications

hackers are - answer smarter, gain leverage through sophisticated automation,
exploit increasing connected world, more skilled at hiding

threats are involving by - answer becoming more sophisticated, frequent, and
damaging

types of security incidents - answer internal breach, external breach, exploit design
flaw, physical disruption through natural causes, internet infrastructure attacks

Internal breach - answer theft or loss of data; physical break in, loss of equipment,
insider attacks, insider spoofing

largest financial threat - answer insider attacks

External probe - answer unusual attempt to gain access to system or website

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Pogba119. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

56326 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.49
  • (0)
Add to cart
Added