DSST Ethics In Technology exam with
complete solutions 2024/2025
Boot Sector Virus - ANSWER-An infectious program that can replace the boot
program with a modified, infected version, often causing boot and data retrieval
problems.
The boot sector virus is so named because it can overtake your computer when it
is booting up.
Trojan Horse or Program Virus - ANSWER-a coded program which masks the
existence of a virus or malware by making its appearance look normal while
containing malicious utilities transparent to the user; utilities that execute
unnoticed in the background until it is too late.
Primary intent is to steal personal info
Macro Virus - ANSWER-a virus that attaches itself to a document that uses
macros ie. Microsoft Word and Excel
Browser Hijacker - ANSWER-Changes your homepage or settings in your browser
window have been modified without your permission. Come from adware and
spyware.
Resident Virus - ANSWER-Loaded into random access memory (RAM) each time
the computer is turned on and stays there.
Can effect any file in your system if the program is not executed.
,Cavity Virus - ANSWER-Sometimes called a spacefiller virus, is inserted into the
empty spaces that exist in regular computer files.
Undetectable since it does not change the size of the file.
Polymorphic Virus - ANSWER-A virus that can change its own code or
periodically rewrites itself to avoid detection. Changes its name to avoid
detection.
Overwrite Virus - ANSWER-a virus that can partially or completely delete
information contained in files it infects. Even replacing portions of application
code with its own payload.
Multipartite Virus - ANSWER-Literally meaning "multipart" virus; spread in
numerous ways and infect your computer based on different variables including
the start-up of an operating system,
Avoiding Virus and Trojans - ANSWER-Always avoid opening e-mail and
attachments from individuals you do not know.
Install reputable anti-virus software
Never activate questionable hyperlinks.
Add a firewall or router to your network.
Run your anti-virus frequently, especially after each session where you have
downloaded apps or programs.
CIA of Cybersecurity - ANSWER-Confidentiality, Integrity and Availability
Malware - ANSWER-software that is intended to damage or disable computers
and computer systems. Non self replicating.
Computer Virus - ANSWER-a software program capable of reproducing itself and
usually capable of causing great harm to files or other programs on the same
computer
Signature Based Virus Detection - ANSWER-Has its own detection database.
Need to stay up to date on the user side to be effective. attackers continuously
change virus to avoid detection
, Confidentiality - ANSWER-Cybersecurity should ensure that the information to be
secured is only accessible to authorized users and prevents the disclosure of
information to unauthorized parties.
ie to implement confidentiality of company information on a cloud-based
Customer Relationship Management (CRM) system, access can be restricted to
users with the right username-password combination
Integrity - ANSWER-Cybersecurity efforts should ensure information remains
accurate, consistent and not subject to unauthorized modification.
ie: info not intercepted and modified by an intruder.
Availability - ANSWER-Efforts to secure information in cyberspace should not
hinder its access by an authorized party. Additionally, cybersecurity
implementation has to provide for redundancy access in case of any outage.
Caesar Cipher - ANSWER-a technique for encryption that shifts the alphabet by
some number of characters
Enigma Machine - ANSWER-German secret code machine. The Allies managed to
crack the code and read German messages.
Non-repudiation - ANSWER-know who accessed this information, when, and how.
example: f someone accesses your bank balance information, the bank will know
who did it and when it was accessed and how they got it.
Info Security or Info Sec - ANSWER-collection of rules used to protect
information regardless of how and where it is used.
Information Privacy - ANSWER-the right to determine when and to what extent
information about oneself can be communicated to others.
Information Privacy Act - ANSWER-protect individuals' personal information from
unlawful disclosures
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller tuition. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.99. You're not tied to anything after your purchase.