Chapter 010 Privacy and Security

advertisement
Chapter 010 Privacy and Security
Multiple Choice Questions
1. The vast industry involving the gathering and selling of personal data is
A. direct marketing.
B. fund-raising.
C. information reselling.
D. government agencies.
2. One proposed law requiring employers to alert employees during monitoring with some
sort of audible or visual signals was passed to prevent the abuse of which program?
A. Spyware
B. Freeware
C. Snoopware
D. Cookies
3. Programs that are deposited on a user's hard drive when they visit a Web site are called
A. cookies.
B. codes.
C. cache.
D. proxies.
4. Information about how often you visit a Web site can be stored in a _____ on your hard
drive.
A. data file
B. history file
C. cache
D. cookie
10-1
Chapter 010 Privacy and Security
5. A wide range of programs used to secretly record an individual's activities on the Internet is
called
A. spyware.
B. cookies.
C. sniffer programs.
D. keystroke loggers.
6. Which one of the following is the most likely program to be used by investigators having a
few leads on potential suspects' internet activities?
A. Cookies
B. Global positioning systems
C. Keystroke loggers
D. Web bugs
7. This type of computer criminal creates and shares programs designed to gain unauthorized
access to computer systems.
A. employees
B. hackers
C. crackers
D. organized crime
8. Which of the following is not malware?
A. Trojan horses
B. Viruses
C. Worms
D. Spy Doctor
9. A program that fills a computer system with self-replicating information thus clogging the
system is called a
A. virus.
B. worm.
C. denial-of-service attack.
D. damage.
10-2
Chapter 010 Privacy and Security
10. Free computer games and free screen saver programs are typical carriers of
A. DoS.
B. worms.
C. viruses.
D. Trojan horses.
11. Which among the following is the most effective way to ensure the shutting down of an
ISP or a Web site?
A. Denial of service attack
B. Viruses
C. Trojan horses
D. Worms
12. Which among the following is a fraudulent or deceptive act designed to trick individuals
into spending time or money for little or no return?
A. Malicious program
B. Internet scam
C. Theft
D. Data manipulation
13. Theft can take many forms – of hardware, of software, of data, of computer time. Whitecollar computer crime frequently involves the theft of
A. applications.
B. company's computer time.
C. data.
D. property.
14. According to which of the following laws is it illegal for an owner of a program to make
backup copies for their personal use and resell or give them away?
A. Digital Millennium Copyright Act
B. Computer Abuse Amendments Act
C. The Gramm-Leach-Bliley Act
D. Computer Fraud and Abuse Act
10-3
Chapter 010 Privacy and Security
15. Corporations often use this to prevent copyright violations.
A. Digital Millennium Copyright Act
B. Web site encryption
C. Digital rights management (DRM)
D. Keystroke loggers
16. A device that protects against a sudden increase in electrical power is a(n)
A. anti-spiker.
B. voltage regulator.
C. network terminator.
D. surge protector.
17. Saving an important document under a file name which is unrecognizable by others is an
example of
A. a worm.
B. a technological failure.
C. a virus.
D. a human error.
18. A common way to protect information being sent over a network, when long distance is
involved, is
A. restricting access.
B. putting up a firewall.
C. providing passwords.
D. encrypting.
19. A _____ acts as a security buffer between a company's private network and all external
networks.
A. firewall
B. password
C. disaster recovery plan
D. virus checker
10-4
Chapter 010 Privacy and Security
20. In a scenario where the city power shuts down, and backup supplies of electricity are
insufficient, the most beneficial tool for a large firm involved in the completion of several
important deadlines in such a situation would be a/an
A. firewall protection scheme.
B. encryption coding process.
C. disaster recovery plan.
D. virus encryption programs.
21. The most important procedure to protect software and data is to
A. screen applicants to be sure they have no previous records.
B. guard passwords and frequently change them.
C. make frequent backups of data and store them in remote locations.
D. audit data and programs once a year.
22. _____ is concerned with protecting software and data from unauthorized tampering or
damage.
A. Data backup
B. Physical security
C. Disaster recovery plan
D. Data security
23. There are three primary privacy issues: accuracy, property, and
A. cookies.
B. ethics.
C. access.
D. identity theft.
24. This law gives you the right to look at your personal records held by government
agencies:
A. Gramm-Leach-Bliley Act
B. Freedom of Information Act
C. Family Educational Rights and Privacy Act
D. Computer Fraud and Abuse Act
10-5
Chapter 010 Privacy and Security
25. Computer criminals who create and spread viruses are punished under this law:
A. Gramm-Leach-Bliley Act
B. Freedom of Information Act
C. Family Educational Rights and Privacy Act
D. Computer Fraud and Abuse Act
True / False Questions
26. The essential elements that control how computers are used are laws.
True False
27. A special telephone directory called the reverse directory lists telephone numbers
sequentially.
True False
28. It is highly likely that each one of us has an electronic profile created by information
resellers.
True False
29. Identity theft and mistaken identity are the same.
True False
30. People think that by giving limited personal information on the Web restricts the chances
of invasion of their privacy are under the illusion of discretion.
True False
31. Adware cookies are intended to provide customized service.
True False
10-6
Chapter 010 Privacy and Security
32. Web bugs are usually hidden within the HTML code for a Web page or in an e-mail
message as a graphical image.
True False
33. Web bugs are the most invasive and dangerous type of spyware.
True False
34. Spy removal programs are designed to detect and remove cookies, Web bugs, and
monitoring software.
True False
35. Most of the information collected by private organizations is covered under the GrammLeach-Bliley Act.
True False
36. Computer crime is an illegal action in which the perpetrator uses special knowledge of
computer technology.
True False
37. A free antivirus program on the Web is actually a virus that begins by locating and
disabling any existing virus protection program before depositing a virus.
True False
38. The use of a company's computer time by an employee to run another personal business is
considered theft.
True False
10-7
Chapter 010 Privacy and Security
39. The Computer Fraud and Abuse Act makes it a crime to download copyright-protected
music and videos from the Internet.
True False
40. A spike can cause the destruction of chips and other electronic components of a
computer.
True False
41. Security is concerned with protecting information, hardware, and software from
unauthorized use as well as from damage from intrusions, sabotage, and natural disasters.
True False
42. One of the most widely used personal firewall systems is Pretty Good Privacy.
True False
43. Biometric scanning devices use fingerprint and iris scanners.
True False
44. If copyright-protected music is uploaded to a Web site, it is always legal to download it.
True False
45. Cutting and pasting material from a Web site directly into your own report or paper
without giving proper credit to the original source is unethical.
True False
10-8
Chapter 010 Privacy and Security
Fill in the Blank Questions
46. _____ relates to the responsibility of those who have data to control who is able to use the
data.
________________________________________
47. Using publically available databases, information resellers create _____ and sell them to
direct marketers, fundraisers, and others.
________________________________________
48. _____ is the illegal assumption of someone's identity for the purposes of economic gain.
________________________________________
49. _____ cookies monitor your activities at a single Web site.
________________________________________
50. Adware is a type of _____.
________________________________________
51. _____ are criminals who create programs to gain unauthorized access to computer
systems.
________________________________________
52. _____ are programs that travel through networks and operating systems and attach
themselves to various other programs and databases.
________________________________________
10-9
Chapter 010 Privacy and Security
53. A(n) _____ attack attempts to slow down or stop a computer system or network by
sending repetitive requests for information.
________________________________________
54. A deceptive act using the Internet, used to trick people into spending their money and time
for no gain is called a(n) _____.
________________________________________
55. _____ attempts to trick Internet users into thinking a fake but official-looking Web site or
e-mail is legitimate.
________________________________________
56. Computers infected by a virus, worm, or Trojan horse that allows them to be remotely
controlled for malicious purposes are called _____.
________________________________________
57. _____ can help protect your computer against voltage spikes.
________________________________________
58. _____ mistakes are the most commonplace threat to data and software.
________________________________________
59. _____ involves coding information so that only the user can read or otherwise use it.
________________________________________
60. _____ scanning devices check fingerprints or iris scans.
________________________________________
10-10
Chapter 010 Privacy and Security
61. _____ security is concerned with protecting hardware from possible human and natural
disasters.
________________________________________
62. _____ security is concerned with protecting software and data from unauthorized
tampering or damage.
________________________________________
63. All electronic communications coming into and leaving a corporation must be evaluated
by the _____.
________________________________________
64. A _____ attack uses software to try thousands of common words sequentially in an
attempt to gain unauthorized access to a user's account.
________________________________________
65. _____ is the science of disguising and revealing encrypted information.
________________________________________
Essay Questions
66. Describe how information about individuals is collected and compiled.
10-11
Chapter 010 Privacy and Security
67. Explain cookies and identify the difference between traditional cookies and ad network
cookies.
68. Describe the difference between spyware and snoopware.
69. Explain how a Web bug works.
70. Briefly describe the sources of computer crime and the effects of it.
10-12
Chapter 010 Privacy and Security
71. Explain the danger and spread of a computer virus.
72. How do firewalls work?
73. What are computer ethics?
74. Discuss copyright issues as they relate to the Internet, including software piracy and
digital rights management.
10-13
Chapter 010 Privacy and Security
75. What is plagiarism, and why is it a particular concern today?
10-14
Chapter 010 Privacy and Security Key
Multiple Choice Questions
1. (p. 283) The vast industry involving the gathering and selling of personal data is
A. direct marketing.
B. fund-raising.
C. information reselling.
D. government agencies.
Information reselling involves the gathering and selling of personal data.
Difficulty: Medium
2. (p. 285) One proposed law requiring employers to alert employees during monitoring with
some sort of audible or visual signals was passed to prevent the abuse of which program?
A. Spyware
B. Freeware
C. Snoopware
D. Cookies
Snoopware programs record virtually everything you do on your computer.
Difficulty: Medium
3. (p. 286) Programs that are deposited on a user's hard drive when they visit a Web site are
called
A. cookies.
B. codes.
C. cache.
D. proxies.
Cookies are programs that are deposited on your hard disk from Web sites visited.
Difficulty: Easy
10-15
Chapter 010 Privacy and Security Key
4. (p. 286) Information about how often you visit a Web site can be stored in a _____ on your
hard drive.
A. data file
B. history file
C. cache
D. cookie
Cookies are specialized text files that are deposited on your hard disk from Web sites you
have visited.
Difficulty: Easy
5. (p. 287) A wide range of programs used to secretly record an individual's activities on the
Internet is called
A. spyware.
B. cookies.
C. sniffer programs.
D. keystroke loggers.
The term spyware is used to describe a wide range of programs that are designed to secretly
record and report an individual's activities on the Internet.
Difficulty: Medium
6. (p. 288) Which one of the following is the most likely program to be used by investigators
having a few leads on potential suspects' internet activities?
A. Cookies
B. Global positioning systems
C. Keystroke loggers
D. Web bugs
Computer monitoring software has been used by the FBI and the CIA to collect incriminating
evidence on suspected terrorists and organized crime members. These programs are also
widely used by private investigators, criminals, and spouses.
Difficulty: Hard
10-16
Chapter 010 Privacy and Security Key
7. (p. 292) This type of computer criminal creates and shares programs designed to gain
unauthorized access to computer systems.
A. employees
B. hackers
C. crackers
D. organized crime
Crackers create and share programs designed to gain unauthorized access to computer
systems. Their motives are malicious and can be very destructive and costly.
Difficulty: Medium
8. (p. 293) Which of the following is not malware?
A. Trojan horses
B. Viruses
C. Worms
D. Spy Doctor
Spy Doctor is an anti-spyware program.
Difficulty: Medium
9. (p. 293) A program that fills a computer system with self-replicating information thus
clogging the system is called a
A. virus.
B. worm.
C. denial-of-service attack.
D. damage.
A worm is a self-replicating virus that clogs the systems.
Difficulty: Medium
10-17
Chapter 010 Privacy and Security Key
10. (p. 294) Free computer games and free screen saver programs are typical carriers of
A. DoS.
B. worms.
C. viruses.
D. Trojan horses.
The most common types of Trojan horses appear as free computer games and free screen
saver programs that can be downloaded from the Internet.
Difficulty: Hard
11. (p. 294) Which among the following is the most effective way to ensure the shutting down of
an ISP or a Web site?
A. Denial of service attack
B. Viruses
C. Trojan horses
D. Worms
A DoS attack floods a computer or network with requests for information and data. The
targets of these attacks are usually Internet service providers (ISP) and specific Web sites.
Difficulty: Hard
12. (p. 294) Which among the following is a fraudulent or deceptive act designed to trick
individuals into spending time or money for little or no return?
A. Malicious program
B. Internet scam
C. Theft
D. Data manipulation
A scam is a fraudulent or deceptive act or operation designed to trick individuals into
spending their time and money for little or no return. An Internet scam is simply a scam using
the Internet.
Difficulty: Easy
10-18
Chapter 010 Privacy and Security Key
13. (p. 294) Theft can take many forms – of hardware, of software, of data, of computer time.
White-collar computer crime frequently involves the theft of
A. applications.
B. company's computer time.
C. data.
D. property.
White-collar crime involves the theft of data.
Difficulty: Easy
14. (p. 300) According to which of the following laws is it illegal for an owner of a program to
make backup copies for their personal use and resell or give them away?
A. Digital Millennium Copyright Act
B. Computer Abuse Amendments Act
C. The Gramm-Leach-Bliley Act
D. Computer Fraud and Abuse Act
The Digital Millennium Copyright Act establishes the right of a program owner to make a
backup copy of any program. It's important to note that none of these copies may be legally
resold or given away.
Difficulty: Medium
15. (p. 300) Corporations often use this to prevent copyright violations.
A. Digital Millennium Copyright Act
B. Web site encryption
C. Digital rights management (DRM)
D. Keystroke loggers
Digital rights management (DRM) encompasses various technologies that control access to
electronic media and files.
Difficulty: Medium
10-19
Chapter 010 Privacy and Security Key
16. (p. 296) A device that protects against a sudden increase in electrical power is a(n)
A. anti-spiker.
B. voltage regulator.
C. network terminator.
D. surge protector.
A device that protects against sudden increase in electrical power is a surge protector.
Difficulty: Easy
17. (p. 296) Saving an important document under a file name which is unrecognizable by others
is an example of
A. a worm.
B. a technological failure.
C. a virus.
D. a human error.
Some errors may be the result of sloppy procedures. One such example occurs when office
workers save important documents under file names that are not descriptive and not
recognizable by others.
Difficulty: Easy
18. (p. 297) A common way to protect information being sent over a network, when long
distance is involved, is
A. restricting access.
B. putting up a firewall.
C. providing passwords.
D. encrypting.
Encrypting involves coding messages.
Difficulty: Medium
10-20
Chapter 010 Privacy and Security Key
19. (p. 297) A _____ acts as a security buffer between a company's private network and all
external networks.
A. firewall
B. password
C. disaster recovery plan
D. virus checker
A firewall acts as a security buffer between a corporation's private network and all external
networks.
Difficulty: Easy
20. (p. 298) In a scenario where the city power shuts down, and backup supplies of electricity are
insufficient, the most beneficial tool for a large firm involved in the completion of several
important deadlines in such a situation would be a/an
A. firewall protection scheme.
B. encryption coding process.
C. disaster recovery plan.
D. virus encryption programs.
A disaster recovery plan describes ways to continue operating until normal computer
operations can be restored.
Difficulty: Hard
21. (p. 298) The most important procedure to protect software and data is to
A. screen applicants to be sure they have no previous records.
B. guard passwords and frequently change them.
C. make frequent backups of data and store them in remote locations.
D. audit data and programs once a year.
The safest procedure to protect software and data is to keep it backed up and stored in a
remote location.
Difficulty: Medium
10-21
Chapter 010 Privacy and Security Key
22. (p. 296) _____ is concerned with protecting software and data from unauthorized tampering
or damage.
A. Data backup
B. Physical security
C. Disaster recovery plan
D. Data security
Data security is concerned with protecting software and data from unauthorized tampering or
damage.
Difficulty: Easy
23. (p. 283) There are three primary privacy issues: accuracy, property, and
A. cookies.
B. ethics.
C. access.
D. identity theft.
Privacy concerns the collection and use of data about individuals. There are three primary
privacy issues: accuracy, property, and access.
Difficulty: Hard
24. (p. 285) This law gives you the right to look at your personal records held by government
agencies:
A. Gramm-Leach-Bliley Act
B. Freedom of Information Act
C. Family Educational Rights and Privacy Act
D. Computer Fraud and Abuse Act
Under the Freedom of Information Act, you are entitled to look at your records held by
government agencies.
Difficulty: Easy
10-22
Chapter 010 Privacy and Security Key
25. (p. 293) Computer criminals who create and spread viruses are punished under this law:
A. Gramm-Leach-Bliley Act
B. Freedom of Information Act
C. Family Educational Rights and Privacy Act
D. Computer Fraud and Abuse Act
Creating and knowingly spreading a virus is a very serious crime and a federal offense
punishable under the Computer Fraud and Abuse Act.
Difficulty: Medium
True / False Questions
26. (p. 299) The essential elements that control how computers are used are laws.
FALSE
Difficulty: Medium
27. (p. 283) A special telephone directory called the reverse directory lists telephone numbers
sequentially.
TRUE
Difficulty: Medium
28. (p. 283) It is highly likely that each one of us has an electronic profile created by information
resellers.
TRUE
Difficulty: Easy
10-23
Chapter 010 Privacy and Security Key
29. (p. 285) Identity theft and mistaken identity are the same.
FALSE
Difficulty: Medium
30. (p. 285) People think that by giving limited personal information on the Web restricts the
chances of invasion of their privacy are under the illusion of discretion.
FALSE
Difficulty: Hard
31. (p. 287) Adware cookies are intended to provide customized service.
FALSE
Difficulty: Medium
32. (p. 287) Web bugs are usually hidden within the HTML code for a Web page or in an e-mail
message as a graphical image.
TRUE
Difficulty: Medium
33. (p. 288) Web bugs are the most invasive and dangerous type of spyware.
FALSE
Difficulty: Medium
34. (p. 289) Spy removal programs are designed to detect and remove cookies, Web bugs, and
monitoring software.
TRUE
Difficulty: Easy
10-24
Chapter 010 Privacy and Security Key
35. (p. 289) Most of the information collected by private organizations is covered under the
Gramm-Leach-Bliley Act.
FALSE
Difficulty: Medium
36. (p. 292) Computer crime is an illegal action in which the perpetrator uses special knowledge
of computer technology.
TRUE
Difficulty: Easy
37. (p. 293) A free antivirus program on the Web is actually a virus that begins by locating and
disabling any existing virus protection program before depositing a virus.
FALSE
Difficulty: Hard
38. (p. 294) The use of a company's computer time by an employee to run another personal
business is considered theft.
TRUE
Difficulty: Easy
39. (p. 300) The Computer Fraud and Abuse Act makes it a crime to download copyrightprotected music and videos from the Internet.
FALSE
Difficulty: Medium
10-25
Chapter 010 Privacy and Security Key
40. (p. 296) A spike can cause the destruction of chips and other electronic components of a
computer.
TRUE
Difficulty: Easy
41. (p. 296) Security is concerned with protecting information, hardware, and software from
unauthorized use as well as from damage from intrusions, sabotage, and natural disasters.
TRUE
Difficulty: Easy
42. (p. 297) One of the most widely used personal firewall systems is Pretty Good Privacy.
FALSE
Difficulty: Medium
43. (p. 296) Biometric scanning devices use fingerprint and iris scanners.
TRUE
Difficulty: Easy
44. (p. 300) If copyright-protected music is uploaded to a Web site, it is always legal to
download it.
FALSE
Difficulty: Medium
10-26
Chapter 010 Privacy and Security Key
45. (p. 300) Cutting and pasting material from a Web site directly into your own report or paper
without giving proper credit to the original source is unethical.
TRUE
Difficulty: Medium
Fill in the Blank Questions
46. (p. 283) _____ relates to the responsibility of those who have data to control who is able to
use the data.
Access
Access relates to the responsibility of those who have data to control who is able to use that
data.
Difficulty: Medium
47. (p. 283) Using publically available databases, information resellers create _____ and sell
them to direct marketers, fundraisers, and others.
electronic profiles
Information resellers create electronic profiles or highly detailed and personalized
descriptions of individuals.
Difficulty: Hard
48. (p. 284) _____ is the illegal assumption of someone's identity for the purposes of economic
gain.
Identity theft
Identity theft is one of the fastest-growing crimes in the country.
Difficulty: Medium
10-27
Chapter 010 Privacy and Security Key
49. (p. 286) _____ cookies monitor your activities at a single Web site.
Traditional
Traditional cookies monitor your activities at a single site.
Difficulty: Medium
50. (p. 287) Adware is a type of _____.
spyware
The term spyware is used to describe a wide range of programs that are designed to secretly
record and report an individual's activities on the Internet. Ad network (adware) cookies are
just one type of spyware.
Difficulty: Medium
51. (p. 292) _____ are criminals who create programs to gain unauthorized access to computer
systems.
Crackers
Crackers create and share programs designed to breach network security or disrupt network
performance. Their motives are malicious and can be destructive and costly.
Difficulty: Medium
52. (p. 293) _____ are programs that travel through networks and operating systems and attach
themselves to various other programs and databases.
Viruses
Viruses are programs that migrate through networks and operating systems, and most attach
themselves to different programs and databases.
Difficulty: Easy
10-28
Chapter 010 Privacy and Security Key
53. (p. 294) A(n) _____ attack attempts to slow down or stop a computer system or network by
sending repetitive requests for information.
denial-of-service (DoS) or denial-of-service or DoS
A denial of service (DoS) attack attempts to slow down or stop a computer system or network
by flooding it with requests for information and data.
Difficulty: Medium
54. (p. 294) A deceptive act using the Internet, used to trick people into spending their money
and time for no gain is called a(n) _____.
Internet scam or scam
A scam is a fraudulent or deceptive act or operation designed to trick individuals into
spending their time and money for little or no return. An Internet scam is a scam using the
Internet.
Difficulty: Medium
55. (p. 294) _____ attempts to trick Internet users into thinking a fake but official-looking Web
site or e-mail is legitimate.
Phishing
Phishing is a technique often employed by scammers to replicate entire Web sites to try to
lure users into divulging their financial information.
Difficulty: Hard
56. (p. 294) Computers infected by a virus, worm, or Trojan horse that allows them to be
remotely controlled for malicious purposes are called _____.
Zombies
Zombies are infected computers controlled remotely for malicious purposes like password
cracking or sending junk e-mail.
Difficulty: Medium
10-29
Chapter 010 Privacy and Security Key
57. (p. 296) _____ can help protect your computer against voltage spikes.
Surge protectors
Microcomputer users should use a surge protector, a device that separates the computer from
the power source of the wall outlet.
Difficulty: Medium
58. (p. 296) _____ mistakes are the most commonplace threat to data and software.
Data-entry
Human mistakes are inevitable. Data-entry errors are probably the most commonplace and
can lead to mistaken identity.
Difficulty: Easy
59. (p. 297) _____ involves coding information so that only the user can read or otherwise use
it.
Encryption or Encrypting
Encryption involves coding information so that only the user can read or otherwise use it.
Difficulty: Medium
60. (p. 296) _____ scanning devices check fingerprints or iris scans.
Biometric
Security can involve using biometric scanning devices such as fingerprint and iris (eye) scan.
Difficulty: Easy
10-30
Chapter 010 Privacy and Security Key
61. (p. 298) _____ security is concerned with protecting hardware from possible human and
natural disasters.
Physical
Physical security is concerned with protecting hardware from possible human and natural
disasters.
Difficulty: Medium
62. (p. 298) _____ security is concerned with protecting software and data from unauthorized
tampering or damage.
Data
Data security is concerned with protecting software and data from unauthorized tampering or
damage.
Difficulty: Medium
63. (p. 297) All electronic communications coming into and leaving a corporation must be
evaluated by the _____.
firewall
Firewalls act as a security buffer between the corporation's private network and all external
networks, including the Internet. All electronic communications coming into and leaving the
corporation must be evaluated by the firewall.
Difficulty: Medium
64. (p. 297) A _____ attack uses software to try thousands of common words sequentially in an
attempt to gain unauthorized access to a user's account.
dictionary
Words, names, and simple numeric patterns make poor passwords because they are especially
vulnerable to a dictionary attack.
Difficulty: Hard
10-31
Chapter 010 Privacy and Security Key
65. (p. 301) _____ is the science of disguising and revealing encrypted information.
Cryptography
In terms of information technology, cryptography usually refers to keeping any intercepted
information private through the use of encryption techniques.
Difficulty: Hard
Essay Questions
66. (p. 283) Describe how information about individuals is collected and compiled.
Large organizations are constantly compiling information about us. Every day data is gathered
about us and stored in large databases. For example, telephone companies compile lists of the
calls we make. Government authorities and others can easily access this information through a
special telephone directory (called a reverse directory) that lists telephone numbers
sequentially. Data gatherers, known as information resellers or information brokers, collect
and sell personal data. They create electronic profiles using publically available and nonpublic databases, and then they sell these electronic profiles to direct marketers, fundraisers,
and others.
Difficulty: Medium
67. (p. 286, 287) Explain cookies and identify the difference between traditional cookies and ad
network cookies.
Cookies are small pieces of information that are deposited on your hard disk when you visit a
Web site. While cookies are harmless in and of themselves, what makes them potentially
dangerous is that they can store information about you without your knowledge. Traditional
cookies provide information to a single Web site. They identify information you may provide
via a form as well as any pages you visit on the site. The Web site uses the traditional cookie
to provide customized service such as greeting you by name or remembering your purchasing
history. Ad network or adware cookies monitor your activities across all sites you visit. These
cookies are deposited by organizations that compile and market the information, often without
your explicit consent.
Difficulty: Medium
10-32
Chapter 010 Privacy and Security Key
68. (p. 287, 288) Describe the difference between spyware and snoopware.
Spyware is a term used to describe a wide range of programs that are designed to secretly
record and report an individual's activities on the Internet. Different types of spyware include
ad network cookies, Web bugs, and computer monitoring software such as keystroke loggers.
Snoopware is a type of computer monitoring software often used by employers to monitor
employees' computer activities.
Difficulty: Medium
69. (p. 287, 288) Explain how a Web bug works.
Web bugs are small images or HTML code hidden within an e-mail message. When a user
opens an e-mail containing a Web bug, information is sent back to the source of the bug. For
example, a common Web bug used by companies that sell e-mail mailing lists is simply an
invisible graphic embedded into an e-mail message. When the e-mail is opened, a request is
sent to display the graphic without the reader's knowledge. The request is sent to a remote
server that uses this information to verify that the e-mail address is active.
Difficulty: Medium
10-33
Chapter 010 Privacy and Security Key
70. (p. 292) Briefly describe the sources of computer crime and the effects of it.
Typically, computer criminals are either employees, outside users, hackers, crackers,
organized crime members, or terrorists. The largest category of computer criminals consists of
employees. Sometimes the employee is simply trying to steal something from the employer equipment, software, electronic funds, proprietary information, or computer time. Sometimes
the employee is acting out of resentment and is trying to get back at the company. Outside
users (such as suppliers and clients) may have access to a company's computer system.
Examples are bank customers who use an automated teller machine. Hackers are people who
create and share programs with fellow hackers. Typically, they are not criminals. Crackers, on
the other hand, create and share programs designed to gain unauthorized access to computer
systems or disrupt networks with malicious intent. Members of organized crime groups have
discovered that they can use computers just as people in legitimate businesses do, but for
illegal purposes such as tracking stolen goods or illegal gambling debts. Counterfeiters and
forgers use microcomputers and printers to produce sophisticated-looking documents such as
checks and driver's licenses. Knowledgeable terrorist groups and hostile governments could
potentially crash satellites and wage economic warfare by disrupting navigation and
communication systems.
Difficulty: Hard
71. (p. 293) Explain the danger and spread of a computer virus.
Viruses are programs that migrate through networks and operating systems and attach
themselves to different programs and databases. While some viruses are relatively harmless,
many can be quite dangerous, altering and/or deleting files and damaging system components.
Viruses typically find their way into microcomputers through e-mail attachments and
programs downloaded from the Internet.
Difficulty: Easy
10-34
Chapter 010 Privacy and Security Key
72. (p. 297) How do firewalls work?
Firewalls act as a security buffer between the corporation's private network and all external
networks, including the Internet. All electronic communications coming into and leaving the
corporation must be evaluated by the firewall. Security is maintained by denying access to
unauthorized communications.
Difficulty: Medium
73. (p. 299) What are computer ethics?
Ethics are standards of moral conduct. Computer ethics are guidelines for morally acceptable
use of computers in our society. We are all entitled to ethical treatment, including the right to
keep personal information, such as credit ratings and medical histories, from getting into
unauthorized hands.
Difficulty: Easy
74. (p. 299, 300) Discuss copyright issues as they relate to the Internet, including software piracy
and digital rights management.
Copyright is a legal concept that gives content creators the right to control use and distribution
of their work. If you make an unauthorized copy of copyrighted work, such as a digital music
file or a software program, you may be in violation of copyright law. Software piracy is the
unauthorized copying and distribution of software. As established by the Digital Millennium
Copyright Act, you have the right to make a backup copy of a program for your own use, but
you cannot legally sell or give away a copy. This makes it illegal to "borrow" a copy of
software from a friend, including downloading unauthorized copies of music from the
Internet. Many corporations are beginning to incorporate digital rights management (DRM)
technologies to control access to electronic media (including movies, music, software, and
video games). DRM may be used to control the number of devices that can access a given file
as well as limit the kinds of devices that can access a file.
Difficulty: Hard
10-35
Chapter 010 Privacy and Security Key
75. (p. 300) What is plagiarism, and why is it a particular concern today?
Plagiarism mean representing some other person's work and ideas as your own without giving
credit to the original source. Computer technology has made plagiarism easier than in the
past. For example, it is very easy to cut and paste content from a Web page into a report or
paper without including proper citations. Fortunately, technology has also made it easier to
catch plagiarism through services such as Turnitin which can examine the contents of a paper
and compare it to a wide range of public electronic documents (including Web pages).
Difficulty: Easy
10-36
Download