Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Other

ISM 3011 EXAM II STUDY GUIDE

Rating
-
Sold
-
Pages
16
Uploaded on
29-04-2026
Written in
2025/2026

ISM 3011 EXAM II STUDY GUIDE

Institution
Course

Content preview

ISM 3011 EXAM II STUDY GUIDE

Copyright - Answers - is the legal protection afforded an expression of an idea, such as
a song, book or video game.

Intellectual Property - Answers - is the intangible creative work that is embodied in
physical form and includes copyrights, trademarks, and patents.

Privacy - Answers - is the right to be left alone when you want to be, to have control of
you own possessions, and not to be observed without your consent.

Confidentiality - Answers - Which is the assurance that messages and information
remain available only to those authorized to view them.

Pirated Software - Answers - is the unauthorized use, duplication, or sale of copyrighted
software.

Counterfeit Software - Answers - is software that is manufactured to look like the real
thing and sold as such.

Information Management - Answers - examines the organizational resource of
information and regulates its definitions, uses, value, and distribution ensuring it has the
types of data/ information required to function or grow effectively.

Epolicies - Answers - are policies and procedures that address information
management along with the ethical use of computers and the Internet in the business
environment.

Ethical Computer Use Policy - Answers - contains general principles to guide computer
user behavior.

Information Private Policy - Answers - contains general principles regarding information
privacy.

Acceptable Use Policy - Answers - requires a user to agree to follow it to be provided
access to corporate email, information systems, and the Internet.

Internet Use Policy - Answers - contains general principles to guide the proper use of
the Internet. (Ex: Describes the Internet services available to users, Defines the
organizations position on the purpose of Internet access and what restrictions, if any,
are placed on that access.)

Email Privacy Policy - Answers - Details the extent to which email messages may be
read by others.

,Social Media Policy - Answers - outlining the corporate guidelines or principles
governing employee online communications.

Information Technology Monitoring - Answers - Tracks peoples activities by such
measures as number of keystrokes, error rate, and number of transactions processes.

Employee Monitoring Policy - Answers - stating explicitly how, when, and where the
company monitors its employees.

Key Logger - Answers - A program that records every keystroke and mouse click

Hardware Key Logger - Answers - A hardware device that captures keystrokes on their
journey from the keyboards to the motherboard.

Cookie - Answers - A small file deposited on a hard drive by a website containing info
about customers and their web activities. Allow websites to record the comings and
goings of customers, usually without their knowledge or consent.

Adware - Answers - Software that generates ads that instal themselves on a computer
when a person downloads some other program from the internet.

Spyware - Answers - Software that comes hidden in free downloadable software and
tracks online movements, mines the information stored on a computer, or uses a
computers CPU and storage for some task the user knows nothing about.

Web log - Answers - Consists of one line of information for every visitor to a website and
its usually stored on a web server.

Clickstream - Answers - Records information about a customer during a Web surfing
session such as what websites were visited, how long the visit was, what ads were
viewed, and what was purchased.

Downtime - Answers - Refers to a period of time when a system is unavailable. Can
strike at any time for any number of reasons, from tornadoes to sink overflows to
network failures to power outages.

Financial Performance (Cost of Downtime) - Answers - Revenue recognition
Cash Flow
Payment Guarantees
Credit Rating
Stock Price

Revenue (Cost of Downtime) - Answers - Direct loss
Compensatory payments
Lost future revenue
Billing Losses

, Investment Losses
Lost productivity

Damaged Reputation (Cost of Downtime) - Answers - Customers
Suppliers
Financial markets
Banks
Business partners

Other Expenses (Cost of Downtime) - Answers - Temporary employees
Equipment rentals
Overtime costs
Extra shipping charges
Travel expenses
Legal obligations

Black-hat hackers - Answers - break into other peoples computer systems and may just
look around or may steal and destroy

Crackers - Answers - have criminal intent when hacking

Cyberterrorists - Answers - seek to cause harm to people or to destroy critical systems
or information and use the internet as a weapon or mass destruction

Hactivists - Answers - have philosophical and political reasons for breaking into systems
and will often deface the website as a protest

Script kiddies or bunnies - Answers - find hacking code on the internet and click and
point their way into systems to cause damage or spread viruses

White-hat hackers - Answers - work at the request of the system owners to find system
vulnerabilities and plug the holes.

Denial-of-Service Attack (DoS) - Answers - floods a website with so many requests for
service that it slows down or crashes the site.

Distributed Denial-of Service Attack (DDoS) - Answers - Attacks from multiple
computers that flood a website with so many requests for service that it slows down or
crashes. A common type is the Ping of Death, in which thousands of computers try to
access a website at the same time, overloading it and shutting it down.

Trojan-horse Virus - Answers - hides inside other software, usually as an attachment or
downloadable file.

Worm - Answers - spreads itself, not only from file to file, but from computer to
computer. The primary difference between a virus and a worm is that a virus must

Written for

Institution
Course

Document information

Uploaded on
April 29, 2026
Number of pages
16
Written in
2025/2026
Type
OTHER
Person
Unknown

Subjects

$14.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Greaterheights Birkbeck, University of London
Follow You need to be logged in order to follow users or courses
Sold
1150
Member since
4 year
Number of followers
881
Documents
19985
Last sold
3 days ago

4.0

221 reviews

5
121
4
43
3
24
2
11
1
22

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions