- What were the advances in information technology that resulted in new ethical issues necessitating the creation of the Computer Fraud and Abuse Act, 1986?
- Should companies report cyber security incidents or not? Is any policy needed around cyber security, and if so, why?
- Compare and contrast various types of controls: Deterrent, Preventive, Detective, Corrective, Compensating, Technical, Administrative, Physical.
- A___________private combination of characters associated with a user name that allows access to certain computer resources.
- Which is the easiest and most common way of password attack used by pick off insecure passwords? (a) Hybrid (b) Dictionary (c) Brute-force (d) Man-in-the-middle.
- Which of the following is not one of the three types of access control? (a) Administrative (b) Personnel (c) Technical (d) Physical.
- Fill in the blank. _________ is a term for a person who devises and carries out a scam in order to accomplish a goal.