ISM 3011 EXAM II STUDY GUIDE
Copyright - Answers - is the legal protection afforded an expression of an idea, such as
a song, book or video game.
Intellectual Property - Answers - is the intangible creative work that is embodied in
physical form and includes copyrights, trademarks, and patents.
Privacy - Answers - is the right to be left alone when you want to be, to have control of
you own possessions, and not to be observed without your consent.
Confidentiality - Answers - Which is the assurance that messages and information
remain available only to those authorized to view them.
Pirated Software - Answers - is the unauthorized use, duplication, or sale of copyrighted
software.
Counterfeit Software - Answers - is software that is manufactured to look like the real
thing and sold as such.
Information Management - Answers - examines the organizational resource of
information and regulates its definitions, uses, value, and distribution ensuring it has the
types of data/ information required to function or grow effectively.
Epolicies - Answers - are policies and procedures that address information
management along with the ethical use of computers and the Internet in the business
environment.
Ethical Computer Use Policy - Answers - contains general principles to guide computer
user behavior.
Information Private Policy - Answers - contains general principles regarding information
privacy.
Acceptable Use Policy - Answers - requires a user to agree to follow it to be provided
access to corporate email, information systems, and the Internet.
Internet Use Policy - Answers - contains general principles to guide the proper use of
the Internet. (Ex: Describes the Internet services available to users, Defines the
organizations position on the purpose of Internet access and what restrictions, if any,
are placed on that access.)
Email Privacy Policy - Answers - Details the extent to which email messages may be
read by others.
,Social Media Policy - Answers - outlining the corporate guidelines or principles
governing employee online communications.
Information Technology Monitoring - Answers - Tracks peoples activities by such
measures as number of keystrokes, error rate, and number of transactions processes.
Employee Monitoring Policy - Answers - stating explicitly how, when, and where the
company monitors its employees.
Key Logger - Answers - A program that records every keystroke and mouse click
Hardware Key Logger - Answers - A hardware device that captures keystrokes on their
journey from the keyboards to the motherboard.
Cookie - Answers - A small file deposited on a hard drive by a website containing info
about customers and their web activities. Allow websites to record the comings and
goings of customers, usually without their knowledge or consent.
Adware - Answers - Software that generates ads that instal themselves on a computer
when a person downloads some other program from the internet.
Spyware - Answers - Software that comes hidden in free downloadable software and
tracks online movements, mines the information stored on a computer, or uses a
computers CPU and storage for some task the user knows nothing about.
Web log - Answers - Consists of one line of information for every visitor to a website and
its usually stored on a web server.
Clickstream - Answers - Records information about a customer during a Web surfing
session such as what websites were visited, how long the visit was, what ads were
viewed, and what was purchased.
Downtime - Answers - Refers to a period of time when a system is unavailable. Can
strike at any time for any number of reasons, from tornadoes to sink overflows to
network failures to power outages.
Financial Performance (Cost of Downtime) - Answers - Revenue recognition
Cash Flow
Payment Guarantees
Credit Rating
Stock Price
Revenue (Cost of Downtime) - Answers - Direct loss
Compensatory payments
Lost future revenue
Billing Losses
, Investment Losses
Lost productivity
Damaged Reputation (Cost of Downtime) - Answers - Customers
Suppliers
Financial markets
Banks
Business partners
Other Expenses (Cost of Downtime) - Answers - Temporary employees
Equipment rentals
Overtime costs
Extra shipping charges
Travel expenses
Legal obligations
Black-hat hackers - Answers - break into other peoples computer systems and may just
look around or may steal and destroy
Crackers - Answers - have criminal intent when hacking
Cyberterrorists - Answers - seek to cause harm to people or to destroy critical systems
or information and use the internet as a weapon or mass destruction
Hactivists - Answers - have philosophical and political reasons for breaking into systems
and will often deface the website as a protest
Script kiddies or bunnies - Answers - find hacking code on the internet and click and
point their way into systems to cause damage or spread viruses
White-hat hackers - Answers - work at the request of the system owners to find system
vulnerabilities and plug the holes.
Denial-of-Service Attack (DoS) - Answers - floods a website with so many requests for
service that it slows down or crashes the site.
Distributed Denial-of Service Attack (DDoS) - Answers - Attacks from multiple
computers that flood a website with so many requests for service that it slows down or
crashes. A common type is the Ping of Death, in which thousands of computers try to
access a website at the same time, overloading it and shutting it down.
Trojan-horse Virus - Answers - hides inside other software, usually as an attachment or
downloadable file.
Worm - Answers - spreads itself, not only from file to file, but from computer to
computer. The primary difference between a virus and a worm is that a virus must
Copyright - Answers - is the legal protection afforded an expression of an idea, such as
a song, book or video game.
Intellectual Property - Answers - is the intangible creative work that is embodied in
physical form and includes copyrights, trademarks, and patents.
Privacy - Answers - is the right to be left alone when you want to be, to have control of
you own possessions, and not to be observed without your consent.
Confidentiality - Answers - Which is the assurance that messages and information
remain available only to those authorized to view them.
Pirated Software - Answers - is the unauthorized use, duplication, or sale of copyrighted
software.
Counterfeit Software - Answers - is software that is manufactured to look like the real
thing and sold as such.
Information Management - Answers - examines the organizational resource of
information and regulates its definitions, uses, value, and distribution ensuring it has the
types of data/ information required to function or grow effectively.
Epolicies - Answers - are policies and procedures that address information
management along with the ethical use of computers and the Internet in the business
environment.
Ethical Computer Use Policy - Answers - contains general principles to guide computer
user behavior.
Information Private Policy - Answers - contains general principles regarding information
privacy.
Acceptable Use Policy - Answers - requires a user to agree to follow it to be provided
access to corporate email, information systems, and the Internet.
Internet Use Policy - Answers - contains general principles to guide the proper use of
the Internet. (Ex: Describes the Internet services available to users, Defines the
organizations position on the purpose of Internet access and what restrictions, if any,
are placed on that access.)
Email Privacy Policy - Answers - Details the extent to which email messages may be
read by others.
,Social Media Policy - Answers - outlining the corporate guidelines or principles
governing employee online communications.
Information Technology Monitoring - Answers - Tracks peoples activities by such
measures as number of keystrokes, error rate, and number of transactions processes.
Employee Monitoring Policy - Answers - stating explicitly how, when, and where the
company monitors its employees.
Key Logger - Answers - A program that records every keystroke and mouse click
Hardware Key Logger - Answers - A hardware device that captures keystrokes on their
journey from the keyboards to the motherboard.
Cookie - Answers - A small file deposited on a hard drive by a website containing info
about customers and their web activities. Allow websites to record the comings and
goings of customers, usually without their knowledge or consent.
Adware - Answers - Software that generates ads that instal themselves on a computer
when a person downloads some other program from the internet.
Spyware - Answers - Software that comes hidden in free downloadable software and
tracks online movements, mines the information stored on a computer, or uses a
computers CPU and storage for some task the user knows nothing about.
Web log - Answers - Consists of one line of information for every visitor to a website and
its usually stored on a web server.
Clickstream - Answers - Records information about a customer during a Web surfing
session such as what websites were visited, how long the visit was, what ads were
viewed, and what was purchased.
Downtime - Answers - Refers to a period of time when a system is unavailable. Can
strike at any time for any number of reasons, from tornadoes to sink overflows to
network failures to power outages.
Financial Performance (Cost of Downtime) - Answers - Revenue recognition
Cash Flow
Payment Guarantees
Credit Rating
Stock Price
Revenue (Cost of Downtime) - Answers - Direct loss
Compensatory payments
Lost future revenue
Billing Losses
, Investment Losses
Lost productivity
Damaged Reputation (Cost of Downtime) - Answers - Customers
Suppliers
Financial markets
Banks
Business partners
Other Expenses (Cost of Downtime) - Answers - Temporary employees
Equipment rentals
Overtime costs
Extra shipping charges
Travel expenses
Legal obligations
Black-hat hackers - Answers - break into other peoples computer systems and may just
look around or may steal and destroy
Crackers - Answers - have criminal intent when hacking
Cyberterrorists - Answers - seek to cause harm to people or to destroy critical systems
or information and use the internet as a weapon or mass destruction
Hactivists - Answers - have philosophical and political reasons for breaking into systems
and will often deface the website as a protest
Script kiddies or bunnies - Answers - find hacking code on the internet and click and
point their way into systems to cause damage or spread viruses
White-hat hackers - Answers - work at the request of the system owners to find system
vulnerabilities and plug the holes.
Denial-of-Service Attack (DoS) - Answers - floods a website with so many requests for
service that it slows down or crashes the site.
Distributed Denial-of Service Attack (DDoS) - Answers - Attacks from multiple
computers that flood a website with so many requests for service that it slows down or
crashes. A common type is the Ping of Death, in which thousands of computers try to
access a website at the same time, overloading it and shutting it down.
Trojan-horse Virus - Answers - hides inside other software, usually as an attachment or
downloadable file.
Worm - Answers - spreads itself, not only from file to file, but from computer to
computer. The primary difference between a virus and a worm is that a virus must