Key factors in procedures - Answer 1. Good training programs.
2. All new applications are approved.
3. Documents of applications be filed to a central office for authorization.
4. System controls for invalid input (input, output, and security controls)
,Meaning of Monitoring policies and prodcedures - Answer Implement internal audits to
measure actual results against goals. Audits track time employees spend on non-work -
related web sites.
E-Government act of 2002 - Answer Requires federal agencies to post privacy policies on
their website.
RFID Tags - Answer microchips under people's skin, or on clothing or car keys for
tracking.
Occupational Stress - Answer anxieties about job insecurity, loss of control,
incompetence.
SIT (seated immobility thromboembolism) - Answer formation of blood clots in the legs
or lungs
RSI (repetitive strain injury) - Answer injury or disorder of the muscles, nerves, tendons,
ligaments, or joints caused by repetitive motion.
CTS (carpal tunnel syndrome) - Answer inflammation of the nerve that connects the
forearm to the palm of the wrist.
Code of Ethics - Answer States the principles and core values essential to a set of people,
and therefore, govern their behavior. Can be a reference point for weighing what is legal
and ethical.
Privacy - Answer The right to be left alone or to be withdrawn from public view.
,BYOD (bring your own device) - Answer business policy that permits employees to use
their own mobile devices to access company computing resources and applications.
Ransomware - Answer malware that stops you from using your computer and asks for
demands before letting you use your computer again.
Virus - Answer piece of code that causes computer to behave in an unexpected manner.
Worms - Answer harmful program that resides in active memory and duplicates itself.
Can spread without intervention.
Trojan Horse - Answer seemingly harmless program in which malicious code is hidden.
Creates a "backdoor" on computer enabling attack gain future access.
Blended Threat - Answer Combination of virus, worm, trojan horse, and other bad
codes.
Spam - Answer Use of email system to send unsolicited email to large numbers of
people.
CAN-SPAM Act - Answer It is legal to send spam as long as messages meets 3 basic
requirements.
CAPTCHA - Answer automated public turing test to tell computers and humans apart.
Ex: enter weird code that is in picture that only humans can see.
, Phishing - Answer Act of fraudulently using email to try to get the recipient to reveal
personal data.
Spear-phishing - Answer fraudulent emails are sent to certain employees. Look like they
come from high-level executives.
Smishing - Answer variation of phishing that uses texting
Vishing - Answer victims receive voice mail message telling them to call a phone
number.
Cyberespionage - Answer Development of malware that secretly steals data in the
computer systems of organizations, agencies, and firms.
Cyberterrorism - Answer intimidation of gov. of civilian population by using information
technology to disable critical national infrastructure.
Firewall - Answer system of software, hardware, or a combination of both that stands
guard between an organization's internal network and the internet and limits networks
based on the organization's access policy.
NGFW (next generation firewall) - Answer security system that is able to detect and
block sophisticated attacks by filtering network traffic on packet content.
Security Audit - Answer Evaluates whether organization has well-considered security
policy in place.
IDS (Intrusion Detection System) - Answer Notifies network security personnel when it
detects network traffic that attempts to circumvent security measures.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Examsplug. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.