100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISTM FINAL EXAM QUESTIONS & ANSWERS

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
25-01-2026
Written in
2025/2026

ISTM FINAL EXAM QUESTIONS & ANSWERS

Institution
ISTM
Course
ISTM










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISTM
Course
ISTM

Document information

Uploaded on
January 25, 2026
Number of pages
16
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISTM FINAL EXAM QUESTIONS & ANSWERS


people.tamu.edu - Answers -authorized A&M user can create website on here, but are
responsible for how website looks

Risk Management - Answers --using strategies to reduce the amount of risk and think
of consequences if something were to go badly
-use a when we get hacked not if we get hacked mindset
-back up everything on system to prepare

white hack hacker - Answers -help test own organizations security by hacking into it.

mitigate - Answers -reduce risk

unsecured computers - Answers -susceptible to malware

intranet - Answers --protected with firewalls
-business network
-local network
-more secure

firewall - Answers -entails specialized hardware and software working together that
ensures that only authorized personnel and employees within a business can use its
Intranet

internet fraud - Answers -any fraudulent activity in an online setting. Internet fraud can
occur through email systems, message boards, chat rooms, or websites.

identity theft - Answers -crime concerning the unlawful practice of assuming another
individual's identity for economic gain, and it is one of the fastest growing crimes in the
United States and Canada.

trojan horse - Answers -certain day, sudden havack

Spyware - Answers -Software that installs itself on a user's system without permission
and gleans personal data and information about the user without their knowledge or
permission

adware - Answers -Software that routinely displays advertising to a computer system
after the software is installed, usually without the user's consent.

spam/junk mail - Answers -abuse of email system.
unsolicited email messages sent to a massive audience.

,reverse phishing/key logging - Answers -when user sign in to. computer, malicious
software covertly records keystrokes

antivirus software - Answers -be aware if package is working well enough to prevent
your machine from virus. Norton McCaffee

brand new code/virus - Answers -hard to stop, but updates are made to protect you
from

what commercial came on a lot during Masters? - Answers -IBM

click fraud - Answers -manipulating the number of times an ad is clicked on to inflate
advertising bills

purchase scam - Answers -merchant doesn't deliver to customer

phishing - Answers --#1 way hackers get into business
-engineered to gain private info by asking over email

computer privacy - Answers -- remain anonymous while using computer system or
network
-people protection

confidentiality privacy - Answers -business protection

shoulder surfing - Answers --type of identity theft
-criminal glances over victims shoulder to gain info like a pin # or password

SCAM - Answers -stingy about giving personal information
check financial info on regular basis
ask for credit reports
maintain careful records

cybersecurity.tamu.edu - Answers -place where aggies can increase skills on cyber
security

privacy for european union - Answers -US companies must do things differently for
security

KBTX - Answers --system they like to use is offline
-business issue

data breach due to click to gov - Answers --small cities
-local gov installs security patches
-exposure started again last year so more must be done
-patching software app not it anymore

, -effects customers with one time payments

family friend - Answers --started working for big company
-started own business to help smaller companies follow standards
-white hack hacker

college station breach - Answers --terminated contract
-signed up with more expensive contract
-need investment since more security means more $
-attackers made money and got 9.1 million on dark web

hospital held for ransom in LA - Answers --paralyzed by hackers
-docs had no patient records for week +
- no email or health records
-demanded millions of dollars/3.6 bitcoin
-FBI involved and docs talked by mouth or fax
-paper writing/transfers
-random and not malicious so coul dbe an employee accident

holding a system for ransome IMPORTANT - Answers --doesn't mean hacker can see
your data, but site is down and you are forced to pay to get it back-
-average demand is $300
-need bizz decision to decide how often to backup

China hacking - Answers --lots of hacking going on in HP and IBM
-know the risk when investing with china

Big4 - Answers -china, russia, N Korea and iran

Estonia - Answers --recovers from massive DDos attack(classic example of denial of
service attack
-attacked in 2007
-bad things clog up ability for someone to view site
-legit users denied service by hackers
-russian hackers mad bc estonia moved bronze structure
-estonia is not very big, high tech
-got bombarded by russia
-ask for NATOs help
-cyber security expert came in to help

Structured Data - Answers --process automated
-use tags on certain things
-standardization on reporting
-standard pieces identifiable by huumans or computers

xBRL - Answers --extensible business reporting language

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
2013
Member since
3 year
Number of followers
1447
Documents
48755
Last sold
9 hours ago

3.8

345 reviews

5
172
4
61
3
44
2
16
1
52

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions