Solutions 100% Correct
Their policies must be specific, detailed, explained, and written to understand What is true
of policies that companies create for their employees?
E-mail policy Policy that explains how e-mail should be used
Shoulder Surfing A criminal in a public place will simply glance over their victims'
shoulder and watch them type or listen for personal information.
Information policy Policy that explains how it should be handled
Social Media policy Policy that states what you can/cannot post online
Internet Use policy Policy that states what websites you can/cannot visit (puts guidelines
on networks)
Work Place policy Policy that tracks your error rates, key strokes, transactions, and
anything else that deals with the work place
, ISTM 210: exam 4 (Curtsinger) With
Solutions 100% Correct
- Anti-virus software
- Firewall
- Good passwords How do we protect our computers?
Anti-Virus Software Computer programs that attempt to identify, prevent and eliminate
computer viruses and malware, and typically before they reach a computing system or network.
5.8 million a day How many emails are blocked from A&M's campus?
It will get shut down in 30 minutes What happens if your e-mail gets "compromised"?
Malware: life jacking & link jacking What causes damages?
Life Jacking Ex. You click on a picture and then it downloads a virus
, ISTM 210: exam 4 (Curtsinger) With
Solutions 100% Correct
Link Jacking Ex. You click on an article to read, and the page redirects to a website that
has virus'
33% What amount of businesses use DOS?
They loose about $40,000 an hour What happens when a business' network goes down
from a virus?
Reverse Phishing/Keylogging A newer form of malware when a perpetrator logs on to a
computer and installs a program that records every keystroke made at the workstation's
keyboard.
Computer Worm - Self-replicating but it does not need to attach itself to an existing
program to spread
- Uses networks to travel by sending copies of themselves to other parts of the network without a
user's knowledge
- Can slow the system
- Erases files & damages hardware
, ISTM 210: exam 4 (Curtsinger) With
Solutions 100% Correct
Trojan Horse - Originates from the Greek myth
- Program often seems harmless and possibly interesting until it is executed
True True/False:
Keylogging is another name for Reverse Phishing.
Internet Fraud Any fraudulent activity that takes place online.
Click Fraud When you click on an add and the person gets money from it
Phishing When you get an e-mail but it's not a real one; it looks identical to an
email/website where they want you to change your password.
Communication; everyone should collaborate with each other What is an important aspect
for all types of departments?
1) SOX: this law was created to prevent businesses from committing fraud