logo image

ISYS 209 C8

Which act requires financial institutions to ensure the security and confidentiality of customer data
Gramm-Leach-Billey Act
A _____________ is a unique type of malware that replicates itself from one computer to another
Gaining access to a safety deposit box using iris scanning is an example of ___________________ authentication
Someone hacking into your facebook
Electronic evidence on computer storage media that is not visible to the average user is called ____________
ambient data
The ________ virus, a rather nice sounding virus, was one of the most
__________________ requires that your patient records be protected and saved for six years
Establishing a risk level of malware threats to an organization
risk assessment
Which of the following is NOT addressed by a business continuity plan?
The technical issues involved in keeping systems up and running
___________________ is the ability to determine that a person is who he or she claims to be through a variety of means
Which of the following is NOT a security threat posed by the use of the iPhone, iPad,
Dictating what kind of data an app can access inside its sandbox domain
Which of the following is an opportunity for threats to gain access to assets
A __________ is a type of spyware that records keystrokes to steal sensitive
A __________ is a program that seems like a normal program, but does something completely unexpected
Trojan horse
_________________ is a general security term that includes computer viruses, worms, and Trojan horses
Which of the following is a critical security function of senior management in an organization
Establishing the security policy and managing risk
_______________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock
If you receive an email asking for your social security number in return for a million
Which of the following examines data files and sorts out low-priority online material while assigning higher priority to business-critical
Deep packet inspection
Although it may seem innocent enough, _________is a serious problem for companies that are involved with pay-per-click
click fraud
tricking employees to reveal their password by pretending to be a legitimate member of a company
social engineering
Which of the following is FALSE regarding public-key encryption
on receiving the message, the recipient uses the public key to decrypt it
Taking over computers and directing those systems to overload a network is defined as
Which of the following is FALSE regarding digital certificates?
The CA verifies a digital certificate user’s identity online
____________ provides rules related to the creation of financial statement to help avoid fraud
Sarbanes-Oxley Act

Need essay sample on "ISYS 209 C8"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
Complete Buyer Protection
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy