M0084 – Sistem Informasi dalam Manajemen True-False – Individual Assignment

advertisement
M0084 – Sistem Informasi dalam Manajemen
True-False – Individual Assignment
Pertemuan – 23
Information Security
1. The term information security is used to describe the protection of both computer and
noncomputer equipment, facilities, data, and information from misuse by
unauthorized parties.
2. The information security objective of confidentiality is to make its data and
information available to those who are authorized to use it.
3. Benchmark compliance is a recommended level of security that in normal
circumstances should offer reasonable protection against unauthorized intrusion.
4. Information security threats can be internal as well as external, and they can be
accidental as well as intentional.
5. An information security risk is a potential undesirable outcome of a breach of
information security by an information security threat.
6. When the database and software library are made available to persons not entitled to
have access it is referred to as unauthorized use.
7. According to a survey by the Gartner Group, credit card fraud is 12 times more
prevalent for merchants who deal with their customers face- to- face than for ecommerce retailers.
8. User authorization makes use of access control files that specify the levels of access
available to each user.
9. Firewalls act as filters and barriers that restrict the flow of data to and from the firm
from the World Wide Web.
10. An application-level firewall is located between the router and the computer
performing the application.
11. Firms can carry physical controls to the limit by locating their computer centers in
remote areas far from cities and far from areas especially sensitive to such natural
disasters as earthquakes, floods, and hurricanes.
12. If formal controls are to be effective, then top management must participate actively
in their establishment and enforcement.
13. In the U.K. Anti-terrorism, Crime and Security Act of 2001, ISPs are exempted from
liability if they report suspicions to the government that an Internet crime might be
committed.
14. The activity aimed at continuing to operate after an information system disruption is
called disaster recovery.
15. A firm's vital records plan specifies how the vital records will be protected.
Download