1) Smartphones have the same security flaws as other Internet-connected devices.
2) In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.
3) Viruses can be spread through e-mail.
4) The term cracker is used to identify a hacker whose specialty is breaking open security systems.
5) To secure mobile devices, a company will need to implement special mobile device management software.
6) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
7) Computer worms spread much more rapidly than computer viruses.
8) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
9) Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
10) DoS attacks are used to destroy information and access restricted areas of a company’s information system.
11) The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
12) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
13) An acceptable use policy defines the acceptable level of access to information assets for different users.
14) Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
15) Packet filtering catches most types of network attacks.
16) NAT conceals the IP addresses of the organization’s internal host computers to deter sniffer programs.
17) SSL is a protocol used to establish a secure connection between two computers.
18) Public key encryption uses two keys.
19) Over 70 percent of malware today is aimed at small businesses.
20) Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.
21) ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
22) ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.
23) Large amounts of data stored in electronic form are ________ than the same data in manual form.
C) vulnerable to many more kinds of threats
24) Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that:
C) may be accessible by anyone who has access to the same network.
25) Specific security challenges that threaten the communications lines in a client/server environment include:
A) tapping; sniffing; message alteration; radiation.
26) Specific security challenges that threaten clients in a client/server environment include:
D) unauthorized access; errors; spyware.
27) Specific security challenges that threaten corporate servers in a client/server environment include:
B) hacking; vandalism; denial of service attacks.
28) The Internet poses specific security problems because:
A) it was designed to be easily accessible.
29) Which of the following statements about the Internet security is not true?
C) VoIP is more secure than the switched voice network.
30) An independent computer program that copies itself from one computer to another over a network is called a: