Professional Documents
Culture Documents
Preliminary Examination
10 Points each.
A computer system is a collection of entities that are designed to receive, process, manage and present
information in a meaningful format.
2. What is data?
Answer:
Data us a distinct pieces of information usually stored in a way that is compatible with a specific
purpose.
1. Intimidation
2. Sharing of pornographic content
3. Cyber bullying
4. Online violence
5. Employee involvement in social networking
It is the identification of hazards that could negatively impact an organization’s ability to conduct
business.
It is the illegal and unethical theft of business trade secrets for use by a competitor to achieve a
competitive advantage.
6. What is cyber terrorists?
Answer:
Cyber terrorist is any cyber attack that intimidates or generates fear in the target population. They do
this by damaging or disrupting critical infrastructure.
Answer:
A white hat is an ethical security hacker. Ethical hacking is a term meant to imply a broader category
than just penetration testing. An ethical hacker is always on the lookout for flaws in a company's
network and works to strengthen it
Answer:
Black Hat hackers are criminals who break into computer networks with malicious intent. They may also
release malware that destroys files, holds computers hostage, or steals passwords, credit card numbers,
and other personal information.
Answer:
Gray hat hackers enact a blend of both black hat and white hat activities. Gray hat hackers often look for
vulnerabilities in a system without the owner's permission or knowledge.
Answer:
Identity theft and identity fraud are terms used to refer to all types of crime in which someone
wrongfully obtains and uses another person's personal data in some way that involves fraud or
deception, typically for economic gain.