This document contains a 10 question quiz on management information systems topics related to computer security and controls. The questions cover the differences between security and control, risks of integrating the internet into private networks, definitions of computer viruses, worms, Trojan horses and spyware, the difference between hackers and crackers, denial of service attacks, identity theft, why employees pose security threats, general and application controls, security policies, and how firewalls and network address translation can help connect a corporate network to the internet securely.
This document contains a 10 question quiz on management information systems topics related to computer security and controls. The questions cover the differences between security and control, risks of integrating the internet into private networks, definitions of computer viruses, worms, Trojan horses and spyware, the difference between hackers and crackers, denial of service attacks, identity theft, why employees pose security threats, general and application controls, security policies, and how firewalls and network address translation can help connect a corporate network to the internet securely.
This document contains a 10 question quiz on management information systems topics related to computer security and controls. The questions cover the differences between security and control, risks of integrating the internet into private networks, definitions of computer viruses, worms, Trojan horses and spyware, the difference between hackers and crackers, denial of service attacks, identity theft, why employees pose security threats, general and application controls, security policies, and how firewalls and network address translation can help connect a corporate network to the internet securely.
1. Describe dierence between security and control 2. Describe the risk posed by intergrating internet connectivity into an existing private network (e.g. Local Area Network - L.A.N.) 3. Describe the following terms: i) computer virus ii) Worms iii) Trojan Horse iv) Spyware 4. Describe dierence between hacker and cracker 5. What is Denial of Service (D.o.S.) attack? 6. Describe identity theft 7. Why are employees potential security threats? 8. Describe the following information systems controls: i) general controls ii) application controls 9. What is a security policy? 10. Mr. Silvester Cat is an IT manager at Tweety Bird Construction Ltd.. Mr. SIlvester wants to connect the internet to the internal corporate network of Tweety Bird Construction Ltd.. As part of his assesment, Mr. Silvester notes that he needs a to congure a rewall and also network address translation (N.A.T.). Describe how a rewall and network address translation (N.A.T.) will assist Mr. Silvester in connecting the internal corporate network of Tweety Bird Construction Ltd. to the internet.