Chapter 010 Privacy and Security Multiple Choice Questions 1. The vast industry involving the gathering and selling of personal data is A. direct marketing. B. fund-raising. C. information reselling. D. government agencies. 2. One proposed law requiring employers to alert employees during monitoring with some sort of audible or visual signals was passed to prevent the abuse of which program? A. Spyware B. Freeware C. Snoopware D. Cookies 3. Programs that are deposited on a user's hard drive when they visit a Web site are called A. cookies. B. codes. C. cache. D. proxies. 4. Information about how often you visit a Web site can be stored in a _____ on your hard drive. A. data file B. history file C. cache D. cookie 10-1 Chapter 010 Privacy and Security 5. A wide range of programs used to secretly record an individual's activities on the Internet is called A. spyware. B. cookies. C. sniffer programs. D. keystroke loggers. 6. Which one of the following is the most likely program to be used by investigators having a few leads on potential suspects' internet activities? A. Cookies B. Global positioning systems C. Keystroke loggers D. Web bugs 7. This type of computer criminal creates and shares programs designed to gain unauthorized access to computer systems. A. employees B. hackers C. crackers D. organized crime 8. Which of the following is not malware? A. Trojan horses B. Viruses C. Worms D. Spy Doctor 9. A program that fills a computer system with self-replicating information thus clogging the system is called a A. virus. B. worm. C. denial-of-service attack. D. damage. 10-2 Chapter 010 Privacy and Security 10. Free computer games and free screen saver programs are typical carriers of A. DoS. B. worms. C. viruses. D. Trojan horses. 11. Which among the following is the most effective way to ensure the shutting down of an ISP or a Web site? A. Denial of service attack B. Viruses C. Trojan horses D. Worms 12. Which among the following is a fraudulent or deceptive act designed to trick individuals into spending time or money for little or no return? A. Malicious program B. Internet scam C. Theft D. Data manipulation 13. Theft can take many forms – of hardware, of software, of data, of computer time. Whitecollar computer crime frequently involves the theft of A. applications. B. company's computer time. C. data. D. property. 14. According to which of the following laws is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away? A. Digital Millennium Copyright Act B. Computer Abuse Amendments Act C. The Gramm-Leach-Bliley Act D. Computer Fraud and Abuse Act 10-3 Chapter 010 Privacy and Security 15. Corporations often use this to prevent copyright violations. A. Digital Millennium Copyright Act B. Web site encryption C. Digital rights management (DRM) D. Keystroke loggers 16. A device that protects against a sudden increase in electrical power is a(n) A. anti-spiker. B. voltage regulator. C. network terminator. D. surge protector. 17. Saving an important document under a file name which is unrecognizable by others is an example of A. a worm. B. a technological failure. C. a virus. D. a human error. 18. A common way to protect information being sent over a network, when long distance is involved, is A. restricting access. B. putting up a firewall. C. providing passwords. D. encrypting. 19. A _____ acts as a security buffer between a company's private network and all external networks. A. firewall B. password C. disaster recovery plan D. virus checker 10-4 Chapter 010 Privacy and Security 20. In a scenario where the city power shuts down, and backup supplies of electricity are insufficient, the most beneficial tool for a large firm involved in the completion of several important deadlines in such a situation would be a/an A. firewall protection scheme. B. encryption coding process. C. disaster recovery plan. D. virus encryption programs. 21. The most important procedure to protect software and data is to A. screen applicants to be sure they have no previous records. B. guard passwords and frequently change them. C. make frequent backups of data and store them in remote locations. D. audit data and programs once a year. 22. _____ is concerned with protecting software and data from unauthorized tampering or damage. A. Data backup B. Physical security C. Disaster recovery plan D. Data security 23. There are three primary privacy issues: accuracy, property, and A. cookies. B. ethics. C. access. D. identity theft. 24. This law gives you the right to look at your personal records held by government agencies: A. Gramm-Leach-Bliley Act B. Freedom of Information Act C. Family Educational Rights and Privacy Act D. Computer Fraud and Abuse Act 10-5 Chapter 010 Privacy and Security 25. Computer criminals who create and spread viruses are punished under this law: A. Gramm-Leach-Bliley Act B. Freedom of Information Act C. Family Educational Rights and Privacy Act D. Computer Fraud and Abuse Act True / False Questions 26. The essential elements that control how computers are used are laws. True False 27. A special telephone directory called the reverse directory lists telephone numbers sequentially. True False 28. It is highly likely that each one of us has an electronic profile created by information resellers. True False 29. Identity theft and mistaken identity are the same. True False 30. People think that by giving limited personal information on the Web restricts the chances of invasion of their privacy are under the illusion of discretion. True False 31. Adware cookies are intended to provide customized service. True False 10-6 Chapter 010 Privacy and Security 32. Web bugs are usually hidden within the HTML code for a Web page or in an e-mail message as a graphical image. True False 33. Web bugs are the most invasive and dangerous type of spyware. True False 34. Spy removal programs are designed to detect and remove cookies, Web bugs, and monitoring software. True False 35. Most of the information collected by private organizations is covered under the GrammLeach-Bliley Act. True False 36. Computer crime is an illegal action in which the perpetrator uses special knowledge of computer technology. True False 37. A free antivirus program on the Web is actually a virus that begins by locating and disabling any existing virus protection program before depositing a virus. True False 38. The use of a company's computer time by an employee to run another personal business is considered theft. True False 10-7 Chapter 010 Privacy and Security 39. The Computer Fraud and Abuse Act makes it a crime to download copyright-protected music and videos from the Internet. True False 40. A spike can cause the destruction of chips and other electronic components of a computer. True False 41. Security is concerned with protecting information, hardware, and software from unauthorized use as well as from damage from intrusions, sabotage, and natural disasters. True False 42. One of the most widely used personal firewall systems is Pretty Good Privacy. True False 43. Biometric scanning devices use fingerprint and iris scanners. True False 44. If copyright-protected music is uploaded to a Web site, it is always legal to download it. True False 45. Cutting and pasting material from a Web site directly into your own report or paper without giving proper credit to the original source is unethical. True False 10-8 Chapter 010 Privacy and Security Fill in the Blank Questions 46. _____ relates to the responsibility of those who have data to control who is able to use the data. ________________________________________ 47. Using publically available databases, information resellers create _____ and sell them to direct marketers, fundraisers, and others. ________________________________________ 48. _____ is the illegal assumption of someone's identity for the purposes of economic gain. ________________________________________ 49. _____ cookies monitor your activities at a single Web site. ________________________________________ 50. Adware is a type of _____. ________________________________________ 51. _____ are criminals who create programs to gain unauthorized access to computer systems. ________________________________________ 52. _____ are programs that travel through networks and operating systems and attach themselves to various other programs and databases. ________________________________________ 10-9 Chapter 010 Privacy and Security 53. A(n) _____ attack attempts to slow down or stop a computer system or network by sending repetitive requests for information. ________________________________________ 54. A deceptive act using the Internet, used to trick people into spending their money and time for no gain is called a(n) _____. ________________________________________ 55. _____ attempts to trick Internet users into thinking a fake but official-looking Web site or e-mail is legitimate. ________________________________________ 56. Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _____. ________________________________________ 57. _____ can help protect your computer against voltage spikes. ________________________________________ 58. _____ mistakes are the most commonplace threat to data and software. ________________________________________ 59. _____ involves coding information so that only the user can read or otherwise use it. ________________________________________ 60. _____ scanning devices check fingerprints or iris scans. ________________________________________ 10-10 Chapter 010 Privacy and Security 61. _____ security is concerned with protecting hardware from possible human and natural disasters. ________________________________________ 62. _____ security is concerned with protecting software and data from unauthorized tampering or damage. ________________________________________ 63. All electronic communications coming into and leaving a corporation must be evaluated by the _____. ________________________________________ 64. A _____ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account. ________________________________________ 65. _____ is the science of disguising and revealing encrypted information. ________________________________________ Essay Questions 66. Describe how information about individuals is collected and compiled. 10-11 Chapter 010 Privacy and Security 67. Explain cookies and identify the difference between traditional cookies and ad network cookies. 68. Describe the difference between spyware and snoopware. 69. Explain how a Web bug works. 70. Briefly describe the sources of computer crime and the effects of it. 10-12 Chapter 010 Privacy and Security 71. Explain the danger and spread of a computer virus. 72. How do firewalls work? 73. What are computer ethics? 74. Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management. 10-13 Chapter 010 Privacy and Security 75. What is plagiarism, and why is it a particular concern today? 10-14 Chapter 010 Privacy and Security Key Multiple Choice Questions 1. (p. 283) The vast industry involving the gathering and selling of personal data is A. direct marketing. B. fund-raising. C. information reselling. D. government agencies. Information reselling involves the gathering and selling of personal data. Difficulty: Medium 2. (p. 285) One proposed law requiring employers to alert employees during monitoring with some sort of audible or visual signals was passed to prevent the abuse of which program? A. Spyware B. Freeware C. Snoopware D. Cookies Snoopware programs record virtually everything you do on your computer. Difficulty: Medium 3. (p. 286) Programs that are deposited on a user's hard drive when they visit a Web site are called A. cookies. B. codes. C. cache. D. proxies. Cookies are programs that are deposited on your hard disk from Web sites visited. Difficulty: Easy 10-15 Chapter 010 Privacy and Security Key 4. (p. 286) Information about how often you visit a Web site can be stored in a _____ on your hard drive. A. data file B. history file C. cache D. cookie Cookies are specialized text files that are deposited on your hard disk from Web sites you have visited. Difficulty: Easy 5. (p. 287) A wide range of programs used to secretly record an individual's activities on the Internet is called A. spyware. B. cookies. C. sniffer programs. D. keystroke loggers. The term spyware is used to describe a wide range of programs that are designed to secretly record and report an individual's activities on the Internet. Difficulty: Medium 6. (p. 288) Which one of the following is the most likely program to be used by investigators having a few leads on potential suspects' internet activities? A. Cookies B. Global positioning systems C. Keystroke loggers D. Web bugs Computer monitoring software has been used by the FBI and the CIA to collect incriminating evidence on suspected terrorists and organized crime members. These programs are also widely used by private investigators, criminals, and spouses. Difficulty: Hard 10-16 Chapter 010 Privacy and Security Key 7. (p. 292) This type of computer criminal creates and shares programs designed to gain unauthorized access to computer systems. A. employees B. hackers C. crackers D. organized crime Crackers create and share programs designed to gain unauthorized access to computer systems. Their motives are malicious and can be very destructive and costly. Difficulty: Medium 8. (p. 293) Which of the following is not malware? A. Trojan horses B. Viruses C. Worms D. Spy Doctor Spy Doctor is an anti-spyware program. Difficulty: Medium 9. (p. 293) A program that fills a computer system with self-replicating information thus clogging the system is called a A. virus. B. worm. C. denial-of-service attack. D. damage. A worm is a self-replicating virus that clogs the systems. Difficulty: Medium 10-17 Chapter 010 Privacy and Security Key 10. (p. 294) Free computer games and free screen saver programs are typical carriers of A. DoS. B. worms. C. viruses. D. Trojan horses. The most common types of Trojan horses appear as free computer games and free screen saver programs that can be downloaded from the Internet. Difficulty: Hard 11. (p. 294) Which among the following is the most effective way to ensure the shutting down of an ISP or a Web site? A. Denial of service attack B. Viruses C. Trojan horses D. Worms A DoS attack floods a computer or network with requests for information and data. The targets of these attacks are usually Internet service providers (ISP) and specific Web sites. Difficulty: Hard 12. (p. 294) Which among the following is a fraudulent or deceptive act designed to trick individuals into spending time or money for little or no return? A. Malicious program B. Internet scam C. Theft D. Data manipulation A scam is a fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return. An Internet scam is simply a scam using the Internet. Difficulty: Easy 10-18 Chapter 010 Privacy and Security Key 13. (p. 294) Theft can take many forms – of hardware, of software, of data, of computer time. White-collar computer crime frequently involves the theft of A. applications. B. company's computer time. C. data. D. property. White-collar crime involves the theft of data. Difficulty: Easy 14. (p. 300) According to which of the following laws is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away? A. Digital Millennium Copyright Act B. Computer Abuse Amendments Act C. The Gramm-Leach-Bliley Act D. Computer Fraud and Abuse Act The Digital Millennium Copyright Act establishes the right of a program owner to make a backup copy of any program. It's important to note that none of these copies may be legally resold or given away. Difficulty: Medium 15. (p. 300) Corporations often use this to prevent copyright violations. A. Digital Millennium Copyright Act B. Web site encryption C. Digital rights management (DRM) D. Keystroke loggers Digital rights management (DRM) encompasses various technologies that control access to electronic media and files. Difficulty: Medium 10-19 Chapter 010 Privacy and Security Key 16. (p. 296) A device that protects against a sudden increase in electrical power is a(n) A. anti-spiker. B. voltage regulator. C. network terminator. D. surge protector. A device that protects against sudden increase in electrical power is a surge protector. Difficulty: Easy 17. (p. 296) Saving an important document under a file name which is unrecognizable by others is an example of A. a worm. B. a technological failure. C. a virus. D. a human error. Some errors may be the result of sloppy procedures. One such example occurs when office workers save important documents under file names that are not descriptive and not recognizable by others. Difficulty: Easy 18. (p. 297) A common way to protect information being sent over a network, when long distance is involved, is A. restricting access. B. putting up a firewall. C. providing passwords. D. encrypting. Encrypting involves coding messages. Difficulty: Medium 10-20 Chapter 010 Privacy and Security Key 19. (p. 297) A _____ acts as a security buffer between a company's private network and all external networks. A. firewall B. password C. disaster recovery plan D. virus checker A firewall acts as a security buffer between a corporation's private network and all external networks. Difficulty: Easy 20. (p. 298) In a scenario where the city power shuts down, and backup supplies of electricity are insufficient, the most beneficial tool for a large firm involved in the completion of several important deadlines in such a situation would be a/an A. firewall protection scheme. B. encryption coding process. C. disaster recovery plan. D. virus encryption programs. A disaster recovery plan describes ways to continue operating until normal computer operations can be restored. Difficulty: Hard 21. (p. 298) The most important procedure to protect software and data is to A. screen applicants to be sure they have no previous records. B. guard passwords and frequently change them. C. make frequent backups of data and store them in remote locations. D. audit data and programs once a year. The safest procedure to protect software and data is to keep it backed up and stored in a remote location. Difficulty: Medium 10-21 Chapter 010 Privacy and Security Key 22. (p. 296) _____ is concerned with protecting software and data from unauthorized tampering or damage. A. Data backup B. Physical security C. Disaster recovery plan D. Data security Data security is concerned with protecting software and data from unauthorized tampering or damage. Difficulty: Easy 23. (p. 283) There are three primary privacy issues: accuracy, property, and A. cookies. B. ethics. C. access. D. identity theft. Privacy concerns the collection and use of data about individuals. There are three primary privacy issues: accuracy, property, and access. Difficulty: Hard 24. (p. 285) This law gives you the right to look at your personal records held by government agencies: A. Gramm-Leach-Bliley Act B. Freedom of Information Act C. Family Educational Rights and Privacy Act D. Computer Fraud and Abuse Act Under the Freedom of Information Act, you are entitled to look at your records held by government agencies. Difficulty: Easy 10-22 Chapter 010 Privacy and Security Key 25. (p. 293) Computer criminals who create and spread viruses are punished under this law: A. Gramm-Leach-Bliley Act B. Freedom of Information Act C. Family Educational Rights and Privacy Act D. Computer Fraud and Abuse Act Creating and knowingly spreading a virus is a very serious crime and a federal offense punishable under the Computer Fraud and Abuse Act. Difficulty: Medium True / False Questions 26. (p. 299) The essential elements that control how computers are used are laws. FALSE Difficulty: Medium 27. (p. 283) A special telephone directory called the reverse directory lists telephone numbers sequentially. TRUE Difficulty: Medium 28. (p. 283) It is highly likely that each one of us has an electronic profile created by information resellers. TRUE Difficulty: Easy 10-23 Chapter 010 Privacy and Security Key 29. (p. 285) Identity theft and mistaken identity are the same. FALSE Difficulty: Medium 30. (p. 285) People think that by giving limited personal information on the Web restricts the chances of invasion of their privacy are under the illusion of discretion. FALSE Difficulty: Hard 31. (p. 287) Adware cookies are intended to provide customized service. FALSE Difficulty: Medium 32. (p. 287) Web bugs are usually hidden within the HTML code for a Web page or in an e-mail message as a graphical image. TRUE Difficulty: Medium 33. (p. 288) Web bugs are the most invasive and dangerous type of spyware. FALSE Difficulty: Medium 34. (p. 289) Spy removal programs are designed to detect and remove cookies, Web bugs, and monitoring software. TRUE Difficulty: Easy 10-24 Chapter 010 Privacy and Security Key 35. (p. 289) Most of the information collected by private organizations is covered under the Gramm-Leach-Bliley Act. FALSE Difficulty: Medium 36. (p. 292) Computer crime is an illegal action in which the perpetrator uses special knowledge of computer technology. TRUE Difficulty: Easy 37. (p. 293) A free antivirus program on the Web is actually a virus that begins by locating and disabling any existing virus protection program before depositing a virus. FALSE Difficulty: Hard 38. (p. 294) The use of a company's computer time by an employee to run another personal business is considered theft. TRUE Difficulty: Easy 39. (p. 300) The Computer Fraud and Abuse Act makes it a crime to download copyrightprotected music and videos from the Internet. FALSE Difficulty: Medium 10-25 Chapter 010 Privacy and Security Key 40. (p. 296) A spike can cause the destruction of chips and other electronic components of a computer. TRUE Difficulty: Easy 41. (p. 296) Security is concerned with protecting information, hardware, and software from unauthorized use as well as from damage from intrusions, sabotage, and natural disasters. TRUE Difficulty: Easy 42. (p. 297) One of the most widely used personal firewall systems is Pretty Good Privacy. FALSE Difficulty: Medium 43. (p. 296) Biometric scanning devices use fingerprint and iris scanners. TRUE Difficulty: Easy 44. (p. 300) If copyright-protected music is uploaded to a Web site, it is always legal to download it. FALSE Difficulty: Medium 10-26 Chapter 010 Privacy and Security Key 45. (p. 300) Cutting and pasting material from a Web site directly into your own report or paper without giving proper credit to the original source is unethical. TRUE Difficulty: Medium Fill in the Blank Questions 46. (p. 283) _____ relates to the responsibility of those who have data to control who is able to use the data. Access Access relates to the responsibility of those who have data to control who is able to use that data. Difficulty: Medium 47. (p. 283) Using publically available databases, information resellers create _____ and sell them to direct marketers, fundraisers, and others. electronic profiles Information resellers create electronic profiles or highly detailed and personalized descriptions of individuals. Difficulty: Hard 48. (p. 284) _____ is the illegal assumption of someone's identity for the purposes of economic gain. Identity theft Identity theft is one of the fastest-growing crimes in the country. Difficulty: Medium 10-27 Chapter 010 Privacy and Security Key 49. (p. 286) _____ cookies monitor your activities at a single Web site. Traditional Traditional cookies monitor your activities at a single site. Difficulty: Medium 50. (p. 287) Adware is a type of _____. spyware The term spyware is used to describe a wide range of programs that are designed to secretly record and report an individual's activities on the Internet. Ad network (adware) cookies are just one type of spyware. Difficulty: Medium 51. (p. 292) _____ are criminals who create programs to gain unauthorized access to computer systems. Crackers Crackers create and share programs designed to breach network security or disrupt network performance. Their motives are malicious and can be destructive and costly. Difficulty: Medium 52. (p. 293) _____ are programs that travel through networks and operating systems and attach themselves to various other programs and databases. Viruses Viruses are programs that migrate through networks and operating systems, and most attach themselves to different programs and databases. Difficulty: Easy 10-28 Chapter 010 Privacy and Security Key 53. (p. 294) A(n) _____ attack attempts to slow down or stop a computer system or network by sending repetitive requests for information. denial-of-service (DoS) or denial-of-service or DoS A denial of service (DoS) attack attempts to slow down or stop a computer system or network by flooding it with requests for information and data. Difficulty: Medium 54. (p. 294) A deceptive act using the Internet, used to trick people into spending their money and time for no gain is called a(n) _____. Internet scam or scam A scam is a fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return. An Internet scam is a scam using the Internet. Difficulty: Medium 55. (p. 294) _____ attempts to trick Internet users into thinking a fake but official-looking Web site or e-mail is legitimate. Phishing Phishing is a technique often employed by scammers to replicate entire Web sites to try to lure users into divulging their financial information. Difficulty: Hard 56. (p. 294) Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _____. Zombies Zombies are infected computers controlled remotely for malicious purposes like password cracking or sending junk e-mail. Difficulty: Medium 10-29 Chapter 010 Privacy and Security Key 57. (p. 296) _____ can help protect your computer against voltage spikes. Surge protectors Microcomputer users should use a surge protector, a device that separates the computer from the power source of the wall outlet. Difficulty: Medium 58. (p. 296) _____ mistakes are the most commonplace threat to data and software. Data-entry Human mistakes are inevitable. Data-entry errors are probably the most commonplace and can lead to mistaken identity. Difficulty: Easy 59. (p. 297) _____ involves coding information so that only the user can read or otherwise use it. Encryption or Encrypting Encryption involves coding information so that only the user can read or otherwise use it. Difficulty: Medium 60. (p. 296) _____ scanning devices check fingerprints or iris scans. Biometric Security can involve using biometric scanning devices such as fingerprint and iris (eye) scan. Difficulty: Easy 10-30 Chapter 010 Privacy and Security Key 61. (p. 298) _____ security is concerned with protecting hardware from possible human and natural disasters. Physical Physical security is concerned with protecting hardware from possible human and natural disasters. Difficulty: Medium 62. (p. 298) _____ security is concerned with protecting software and data from unauthorized tampering or damage. Data Data security is concerned with protecting software and data from unauthorized tampering or damage. Difficulty: Medium 63. (p. 297) All electronic communications coming into and leaving a corporation must be evaluated by the _____. firewall Firewalls act as a security buffer between the corporation's private network and all external networks, including the Internet. All electronic communications coming into and leaving the corporation must be evaluated by the firewall. Difficulty: Medium 64. (p. 297) A _____ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account. dictionary Words, names, and simple numeric patterns make poor passwords because they are especially vulnerable to a dictionary attack. Difficulty: Hard 10-31 Chapter 010 Privacy and Security Key 65. (p. 301) _____ is the science of disguising and revealing encrypted information. Cryptography In terms of information technology, cryptography usually refers to keeping any intercepted information private through the use of encryption techniques. Difficulty: Hard Essay Questions 66. (p. 283) Describe how information about individuals is collected and compiled. Large organizations are constantly compiling information about us. Every day data is gathered about us and stored in large databases. For example, telephone companies compile lists of the calls we make. Government authorities and others can easily access this information through a special telephone directory (called a reverse directory) that lists telephone numbers sequentially. Data gatherers, known as information resellers or information brokers, collect and sell personal data. They create electronic profiles using publically available and nonpublic databases, and then they sell these electronic profiles to direct marketers, fundraisers, and others. Difficulty: Medium 67. (p. 286, 287) Explain cookies and identify the difference between traditional cookies and ad network cookies. Cookies are small pieces of information that are deposited on your hard disk when you visit a Web site. While cookies are harmless in and of themselves, what makes them potentially dangerous is that they can store information about you without your knowledge. Traditional cookies provide information to a single Web site. They identify information you may provide via a form as well as any pages you visit on the site. The Web site uses the traditional cookie to provide customized service such as greeting you by name or remembering your purchasing history. Ad network or adware cookies monitor your activities across all sites you visit. These cookies are deposited by organizations that compile and market the information, often without your explicit consent. Difficulty: Medium 10-32 Chapter 010 Privacy and Security Key 68. (p. 287, 288) Describe the difference between spyware and snoopware. Spyware is a term used to describe a wide range of programs that are designed to secretly record and report an individual's activities on the Internet. Different types of spyware include ad network cookies, Web bugs, and computer monitoring software such as keystroke loggers. Snoopware is a type of computer monitoring software often used by employers to monitor employees' computer activities. Difficulty: Medium 69. (p. 287, 288) Explain how a Web bug works. Web bugs are small images or HTML code hidden within an e-mail message. When a user opens an e-mail containing a Web bug, information is sent back to the source of the bug. For example, a common Web bug used by companies that sell e-mail mailing lists is simply an invisible graphic embedded into an e-mail message. When the e-mail is opened, a request is sent to display the graphic without the reader's knowledge. The request is sent to a remote server that uses this information to verify that the e-mail address is active. Difficulty: Medium 10-33 Chapter 010 Privacy and Security Key 70. (p. 292) Briefly describe the sources of computer crime and the effects of it. Typically, computer criminals are either employees, outside users, hackers, crackers, organized crime members, or terrorists. The largest category of computer criminals consists of employees. Sometimes the employee is simply trying to steal something from the employer equipment, software, electronic funds, proprietary information, or computer time. Sometimes the employee is acting out of resentment and is trying to get back at the company. Outside users (such as suppliers and clients) may have access to a company's computer system. Examples are bank customers who use an automated teller machine. Hackers are people who create and share programs with fellow hackers. Typically, they are not criminals. Crackers, on the other hand, create and share programs designed to gain unauthorized access to computer systems or disrupt networks with malicious intent. Members of organized crime groups have discovered that they can use computers just as people in legitimate businesses do, but for illegal purposes such as tracking stolen goods or illegal gambling debts. Counterfeiters and forgers use microcomputers and printers to produce sophisticated-looking documents such as checks and driver's licenses. Knowledgeable terrorist groups and hostile governments could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems. Difficulty: Hard 71. (p. 293) Explain the danger and spread of a computer virus. Viruses are programs that migrate through networks and operating systems and attach themselves to different programs and databases. While some viruses are relatively harmless, many can be quite dangerous, altering and/or deleting files and damaging system components. Viruses typically find their way into microcomputers through e-mail attachments and programs downloaded from the Internet. Difficulty: Easy 10-34 Chapter 010 Privacy and Security Key 72. (p. 297) How do firewalls work? Firewalls act as a security buffer between the corporation's private network and all external networks, including the Internet. All electronic communications coming into and leaving the corporation must be evaluated by the firewall. Security is maintained by denying access to unauthorized communications. Difficulty: Medium 73. (p. 299) What are computer ethics? Ethics are standards of moral conduct. Computer ethics are guidelines for morally acceptable use of computers in our society. We are all entitled to ethical treatment, including the right to keep personal information, such as credit ratings and medical histories, from getting into unauthorized hands. Difficulty: Easy 74. (p. 299, 300) Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management. Copyright is a legal concept that gives content creators the right to control use and distribution of their work. If you make an unauthorized copy of copyrighted work, such as a digital music file or a software program, you may be in violation of copyright law. Software piracy is the unauthorized copying and distribution of software. As established by the Digital Millennium Copyright Act, you have the right to make a backup copy of a program for your own use, but you cannot legally sell or give away a copy. This makes it illegal to "borrow" a copy of software from a friend, including downloading unauthorized copies of music from the Internet. Many corporations are beginning to incorporate digital rights management (DRM) technologies to control access to electronic media (including movies, music, software, and video games). DRM may be used to control the number of devices that can access a given file as well as limit the kinds of devices that can access a file. Difficulty: Hard 10-35 Chapter 010 Privacy and Security Key 75. (p. 300) What is plagiarism, and why is it a particular concern today? Plagiarism mean representing some other person's work and ideas as your own without giving credit to the original source. Computer technology has made plagiarism easier than in the past. For example, it is very easy to cut and paste content from a Web page into a report or paper without including proper citations. Fortunately, technology has also made it easier to catch plagiarism through services such as Turnitin which can examine the contents of a paper and compare it to a wide range of public electronic documents (including Web pages). Difficulty: Easy 10-36