100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CMIS 342 - Chapter 4 Exam

Rating
-
Sold
-
Pages
11
Grade
A
Uploaded on
18-07-2025
Written in
2024/2025

The degree of protection against criminal activity, danger, damage, or loss security Processes and policies designed to protect and defend an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction information security Any danger to which information may be exposed; a malicious or negative event that takes advantage of a vulnerability threat The harm, loss, or damage that can result if a threat compromises an information resource; a known incident in which the vulnerability was acted upon exposure The possibility that an information resource will be harmed by a threat; the likelihood that the harm will occur if the threat happens; a weakness in a system - something that has the potential for being exploited vulnerability The likelihood that a threat will occur; the potential for loss and damage when the threat does occur risk What are the five key factors that are contributing to the increasing vulnerability of organizational 1. Today's interconnected, interdependent, wirelessly networked business environment 2. Smaller, faster, cheaper computers and storage devices 3. Decreasing skills necessary to be a computer hacker 4. International organized crime taking over cybercrime 5. Lack of management support Illegal activities executed on the Internet cybercrime Inside threats vs. outside threats Inside threats: employees and other insiders, systems software, hardware threats Outside threats: man-made disasters, natural disasters, malware, denial of service, unauthorized users

Show more Read less
Institution
CMIS 342
Course
CMIS 342









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CMIS 342
Course
CMIS 342

Document information

Uploaded on
July 18, 2025
Number of pages
11
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CMIS 342




CMIS 342 - Chapter 4 Exam
The degree of protection against criminal activity, danger, damage, or loss
security
Processes and policies designed to protect and defend an organization's information and
information systems from unauthorized access, use, disclosure, disruption, modification,
or destruction
information security
Any danger to which information may be exposed; a malicious or negative event that
takes advantage of a vulnerability
threat
The harm, loss, or damage that can result if a threat compromises an information
resource; a known incident in which the vulnerability was acted upon
exposure
The possibility that an information resource will be harmed by a threat; the likelihood
that the harm will occur if the threat happens; a weakness in a system - something that
has the potential for being exploited
vulnerability
The likelihood that a threat will occur; the potential for loss and damage when the threat
does occur
risk
What are the five key factors that are contributing to the increasing vulnerability of
organizational
1. Today's interconnected, interdependent, wirelessly networked business environment
2. Smaller, faster, cheaper computers and storage devices
3. Decreasing skills necessary to be a computer hacker
4. International organized crime taking over cybercrime
5. Lack of management support


CMIS 342

, CMIS 342



Illegal activities executed on the Internet
cybercrime
Inside threats vs. outside threats
Inside threats: employees and other insiders, systems software, hardware threats
Outside threats: man-made disasters, natural disasters, malware, denial of service,
unauthorized users
Acts performed without malicious intent that nevertheless represent a serious threat to
information security; i.e. human errors and social engineering
unintentional acts
Carelessness with computing devices, opening questionable e-mails, careless internet
surfing, poor password selection and use, carelessness with one's workspace, carelessness
using unmanaged devices, carelessness with discard equipment, careless monitoring of
environmental hazards
examples of human errors
Getting around security systems by using social stills to trick legitimate computer users
inside a company into revealing confidential sensitive information or gaining
unauthorized access privileges (tailgating)
social engineering
Acts performed with malicious intent that represent a serious threat to information
security
intentional acts
Type of deliberate threat that occurs when an unauthorized individual attempts to gain
illegal access to organizational information
espionage/trespass
What is the difference between competitive intelligence and industrial espionage?
Competitive intelligence consists of legal information-gathering techniques, while
industrial espionage crosses the legal boundary



CMIS 342
$15.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
upgrade
2.5
(2)

Get to know the seller

Seller avatar
upgrade PHONIEX UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
5
Member since
1 year
Number of followers
0
Documents
453
Last sold
1 month ago

2.5

2 reviews

5
0
4
1
3
0
2
0
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions