




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、管理信息系統(tǒng)(第7版)章節(jié)練習(xí)題及答案chapter extension 14管理信息系統(tǒng)(第7版)章節(jié)練習(xí)題及答案chapter extension 14 Copyright 2017 Pearson Education, Inc.管理信息系統(tǒng)(第7版)章節(jié)練習(xí)題及答案chapter extension 14Experiencing MIS, 7e (Kroenke)Chapter Extension 14 Data Breaches1) A student at the MSA University hacked into the universitys official Web site
2、 and stole some confidential information about the scholarship program. This incident is an example of _.A) a data breachB) asynchronous communicationC) key escrowD) a sequence flowAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by th
3、e use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Application2) Which of the following is a direct cost of handling a data breach?A) loss of reputationB) abnormal customer turnoverC) legal fees and consultationD) increased customer acquisition activitiesAnswer
4、: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept3) Sam is a hacker who makes money by stealing and selling credit cards. He has targeted th
5、e employees of a local firm and is looking for details such as names, addresses, dates of birth, social security numbers, credit card numbers, or health records. In this case, Sam is looking for _.A) firewall security measuresB) business continuity plansC) malware definitionsD) personally identifiab
6、le informationAnswer: DAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Application4) _ refers to the process of placing a small charge on a credit c
7、ard to ensure it is working.A) HoardingB) CardingC) PhishingD) Credit card hijackingAnswer: BAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept5
8、) Direct costs of handling a data breach do not include paying for detection of the breach.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classificatio
9、n: Concept6) According to the reports in Ponemons 2014 Cost of Data Breach Study, organizations are more likely to lose larger amounts of data than smaller amounts of data.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use
10、of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept7) Personally identifiable information includes a persons bank account numbers, personal identification numbers, email address, and social security numbers.Answer: TRUEAACSB: Information TechnologyDifficulty:
11、1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept8) Stolen credit card information is validated through a process called carding.Answer: TRUEAACSB: Information TechnologyDifficulty: 1:
12、 EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept9) Explain how hackers use information stolen from data breaches for credit card forgery.Answer: Over 67 percent of data breaches come fr
13、om hackers trying to make money. Hackers are primarily looking for personally identifiable information (PII), or data that can be used to identify a person. This includes names, addresses, dates of birth, social security numbers, credit card numbers, health records, bank account numbers, personal id
14、entification numbers, and email addresses. Stolen information is commonly used for credit card fraud. Stolen credit card information is validated through a process called carding, where a small charge is placed on the card to ensure it is working. Valid cards are then bundled and sold on the black m
15、arket. The price of stolen credit cards can run from $2 to $45 per card, depending on the type of account. Stolen data is commonly used for identity theft, extortion, and industrial espionage.AACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised
16、by the use of information systems.Learning Obj: LO 26.1: What is a data breach?Classification: Concept10) The first step in protecting oneself from data breaches is _.A) securing credit and debit card detailsB) understanding how they happenC) learning the technologies used for these activitiesD) ins
17、talling necessary software to protect from possible breachesAnswer: BAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept11) Bob, a hack
18、er, encountered a vulnerability in a banks firewall when he was trying to hack into its Web site. Which of the following can Bob use to take advantage of this liability?A) exploitB) attack vectorC) cardingD) wardriverAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Discuss the et
19、hical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Application12) A group of hackers use a targeted phishing attack to breach a companys firewalls and hack into its security system. Which of the following techniques hav
20、e the hackers used?A) pretextingB) IP spoofingC) spear phishingD) phone phishingAnswer: CAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concep
21、t13) A group of hackers decide to steal credit card details of the users of Swift Shopping Inc., a leading e-commerce company. They infect the security system of the companys third-party vendor and gain access into its internal network. They compromise an internal Windows server of the company and u
22、se a malware to extract customer data. Which of the following is illustrated in this scenario?A) hardeningB) cardingC) pretextingD) data breachingAnswer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Discuss the ethical and social issues raised by the use of information systems.Lea
23、rning Obj: LO 26.2: How do data breaches happen?Classification: Application14) Each type of data breach is different because hackers are continually developing new tools and techniques that enable them to steal more data.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss
24、the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept15) Attack vectors refer to the ways hackers attack a target.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and
25、 social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept16) An exploit is a type of attack vector used by hackers.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues rai
26、sed by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept17) Spear phishing is used by organizations to monitor traffic passing through their internal network.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the et
27、hical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concept18) Explain how data breach occurs with an example.Answer: Hackers are continually developing new tools and techniques that enable them to steal more data. They
28、experiment with new attack vectors, or ways of attacking a target. In the data breach that occurred at Target Corporation in late 2013, attackers first purchased malware designed specifically for the attacks they planned to carry out. They then used spear phishing, or a targeted phishing attack, to
29、infect a Target third party vendors system and gather keystrokes, login credentials, and screenshots from the vendors users. The attackers used this information to gain access into Targets internal network. Once inside Targets network, the attackers compromised an internal Windows file server. From
30、this server, the attackers used malware named Trojan.POSRAM to extract customer data from point-of-sale (POS) terminals. Customer data was continuously sent from the POS terminals to an extraction server within Targets network. It was then funneled out of Targets network to drop servers in Russia, B
31、razil, and Miami. From there, the data was collected and sold on the black market.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Discuss the ethical and social issues raised by the use of information systems.Learning Obj: LO 26.2: How do data breaches happen?Classification: Concep
32、t19) Stuart works for a financial brokerage. His job involves handling sensitive client information such as financial details. Stuart illegally transfers details of some clients from his office computer to his personal email ID, to misuse later. With reference to this situation, Stuart is guilty of
33、_. A) exfiltratingB) cardingC) hardeningD) pretextingAnswer: AAACSB: Reflective ThinkingDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Application20) Which of the following
34、is true of the measures to be taken by an organization in the event of a data breach?A) The organization must delay informing its users so that the occurrence of data breach remains private.B) The organization must not involve additional technical or law enforcement professionals, as it may lead to
35、further damage to its data.C) The organization must destroy the evidence of the breach to avoid future security problems.D) The organization must respond quickly to mitigate the amount of damage hackers can do with the stolen data.Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse L
36、O: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept21) Executives, managers, and all systems personnel of an organization discuss the actions to be taken by each employee in case a data breach occurs.
37、They identify areas that would need immediate attention and assign specific responsibilities to each employee. The employees of the organization are performing a(n) _.A) exfiltrationB) documentationC) walkthroughD) case studyAnswer: CAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Des
38、cribe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Application22) The purpose of a business continuity planning session in an organization is to _.A) discuss how to return the organization to normal operations as q
39、uickly as possible after a data breachB) build plans to increase the market presence of the organization and increase its user baseC) identify new markets that will accelerate the growth of the organizationD) understand the type of information stored by the organization and implement relevant securi
40、ty measures as required by regulatory lawsAnswer: AAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept23) Which of the following should be do
41、ne by employees to protect against data breaches?A) They should develop new exploits.B) They should remove existing honeypots.C) They should design methods for data extrusion.D) They should conduct a walkthrough.Answer: DAACSB: Information TechnologyDifficulty: 2: ModerateCourse LO: Describe differe
42、nt methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept24) Jobs Dot Com, an online recruitment site, was hacked into, and personal information of a number of users was stolen. What information should Jobs Dot Com include in
43、its data breach notification to its users? A) the costs incurred due to the breachB) a sincere apology and an acceptance of responsibility for the incidentC) details of how the breach occurred and the reasons for the breachD) a report on the current security measuresAnswer: BAACSB: Reflective Thinki
44、ngDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Application25) Data extrusion helps organizations secure their data from possible data breaches.Answer: FALSEAACSB: Informat
45、ion TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept26) Despite data breach, organizations should refrain from informing their users immediately as it will lead
46、to mass user defection.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept27) Decisions on how to respond to a data breach are most
47、effective if they are made when the breach is happening.Answer: FALSEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept28) Performing a walkthro
48、ugh should be done as part of a business continuity planning session.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept29) Data brea
49、ch notifications should state that the existing security policies and procedures are inadequate and that changes are being made to prevent similar breaches in the future.Answer: TRUEAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Describe different methods of managing IS security.Learning
50、 Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept30) Why should organizations respond quickly to data breaches?Answer: Organizations need to respond to data breaches quickly for several reasons. First, by responding quickly an organization can stop hackers from
51、 doing more damage. Hackers can be prevented from accessing other internal systems, and affected systems can be patched and cleaned. Additionally, if organizations respond quickly enough, hackers may be prevented from exfiltrating, or illegally transferring, data out of the organization. Second, res
52、ponding quickly may mitigate the amount of damage hackers can do with the stolen data. If the affected users are notified immediately they can change their passwords, cancel their credit cards, and possibly activate credit monitoring services. Third, the longer organizations delay in notifying users
53、, the more upset users become. Based on past data breaches, users are reasonably forgiving of organizations that quickly notify them about what happened and what steps that are being taken to make things right.AACSB: Information TechnologyDifficulty: 3: ChallengingCourse LO: Describe different metho
54、ds of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept31) What are the steps involved in an organizations plan for a data breach?Answer: Data breaches arent guaranteed to happen, but they are likely to happen. As a result, organiza
55、tions need to plan for data breaches. They need to rehearse what they will do when a breach happens. Executives, managers, and systems personnel must perform a walkthrough and discuss the specific steps each person will take after a breach occurs. This should be done as part of a broader business co
56、ntinuity planning session that discusses how to return the organization to normal operations as quickly as possible. As part of the planning process, organizations should form a computer security incident response team (CSIRT) consisting of staff from the legal and public relations departments, as w
57、ell as executives and systems administrators. Coordinated pre-planning for an incident helps organizations avoid missteps like accidentally destroying evidence and issuing poorly worded data breach notices to users. Decisions must be made before the incident, not while its happening.Finally, as part
58、 of the planning process, organizations need to identify additional technical and law enforcement professionals that may need to be brought in to help handle the data breach. Evidence of the breach must be preserved, and the extent of the damage needs to be accurately measured.AACSB: Information Tec
59、hnologyDifficulty: 2: ModerateCourse LO: Describe different methods of managing IS security.Learning Obj: LO 26.3: How should organizations respond to data breaches?Classification: Concept32) The _ is a regulatory law that requires security precautions for government agencies.A) Federal Information
60、Security Management Act (FISMA)B) Gramm-Leach-Bliley Act (GLBA)C) Payment Card Industry Data Security Standard (PCI DSS)D) Family Educational Rights and Privacy Act (FERPA)Answer: AAACSB: Information TechnologyDifficulty: 1: EasyCourse LO: Discuss the ethical and social issues raised by the use of i
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 建筑工程價(jià)格調(diào)整合同條款1-@-1
- 衛(wèi)生間吊頂木龍骨施工方案
- 網(wǎng)架拆除施工方案
- 石墻施工方案
- DB3709T 037-2025泰山茶 茶葉鮮葉采摘分級(jí)技術(shù)規(guī)范
- 博羅縣鋼板支護(hù)樁施工方案
- 海島燕屋年產(chǎn)2500噸高端滋補(bǔ)預(yù)制菜加工項(xiàng)目環(huán)境影響報(bào)告表環(huán)評(píng)報(bào)告表
- 配線架施工施工方案
- 水泥板拉木紋板施工方案
- 2025北京大興高一(上)期末生物(教師版)
- 2024年黑龍江哈爾濱“丁香人才周”(秋季)事業(yè)單位引才招聘2074人易考易錯(cuò)模擬試題(共500題)試卷后附參考答案
- 2024年職工普法教育宣講培訓(xùn)課件
- 自編冷庫庫容制冷量設(shè)備對(duì)照表
- ISO22301新版標(biāo)準(zhǔn)翻譯(中英對(duì)照)
- “全員安全風(fēng)險(xiǎn)辨識(shí)”活動(dòng)實(shí)施方案
- 追覓科技在線測(cè)評(píng)邏輯題
- 凝中國心鑄中華魂鑄牢中華民族共同體意識(shí)-小學(xué)民族團(tuán)結(jié)愛國主題班會(huì)課件
- 第一編第3章 古希臘教育的興衰
- 女性更年期科普-健康科普課件
- 全過程工程咨詢管理服務(wù)方案投標(biāo)方案(技術(shù)方案)
- 2024年中考物理實(shí)驗(yàn)(全國版):探究光的反射定律(解析版)
評(píng)論
0/150
提交評(píng)論