Quiz 9 - Computer Security and Safety, Ethics, and Privacy
1. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.
2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots.
3. Discuss techniques to prevent unauthorized computer access and use
4. Identify safeguards against hardware theft and vandalism
5. Explain the ways software manufacturers protect against software piracy.
6. Discuss how encryption works, and explain why it is necessary
7. Discuss the types of devices available that protect computers from
system failure
8. Explain the options available for backing up computer resources.
9. Identify risks and safeguards associated with wireless communications.
10. Discuss ways to prevent health-related disorders and injuries due to
computer use.
11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing.
12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.
2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots.
3. Discuss techniques to prevent unauthorized computer access and use
4. Identify safeguards against hardware theft and vandalism
5. Explain the ways software manufacturers protect against software piracy.
6. Discuss how encryption works, and explain why it is necessary
7. Discuss the types of devices available that protect computers from
system failure
8. Explain the options available for backing up computer resources.
9. Identify risks and safeguards associated with wireless communications.
10. Discuss ways to prevent health-related disorders and injuries due to
computer use.
11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing.
12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.
Walang komento:
Mag-post ng isang Komento