Actg 474 Final Exam Study Guide Verified
And Updated 2025
Sabotage - Answer✔an intentional act where the intent is to destroy a system or some of its
components
cookie - Answer✔text file created by a website and stored on a visitors hard drive. they store
info about who the user is and what they have done on the site
fraud - Answer✔any and all means a person uses to gain an unfair advantage over another
person
white collar criminals - Answer✔business people who commit fraud, usually resort to trickery or
cunning, and their crimes usually involve a violation of trust or confidence
corruption - Answer✔dishonest conduct by those in power which often involves actions that
are illegitimate, immoral, or incompatible with ethical standards
investment fraud - Answer✔misrepresenting or leaving out facts in order to promote an
investment that promises fantastic profits with little to no risk
misappropriation of assets - Answer✔theft of company assets by employees
fraudulent financial reporting - Answer✔intentional or reckless conduct, whether by act or
omission, that results in materially misleading financial statements
pressure - Answer✔a person's incentive or motivation for committing fraud
opportunity - Answer✔condition or situation that allows a person or organization to commit
and conceal a dishonest act and convert it to a personal gain
lapping - Answer✔concealing the theft of cash by means of a series of delays in posting
collections to accounts receivable
check kiting - Answer✔creating cash using the lag between the time a check is deposited and
the time it clears the bank
rationalization - Answer✔excuse that fraud perpetrators use to justify their illegal behaviors
1|Page
, ©THESTAR 2024/2025 ALL RIGHTS RESERVED 12:43 PM.
computer fraud - Answer✔any type of fraud that requires computer technology to perpetrate
information rights management - Answer✔software that offers the capability to not only limit
access to specific files or documents, but also to specify the actions that individuals who are
granted access to that resource can perform
data loss prevention - Answer✔software that works like antivirus programs in reverse, blocking
outgoing messages that contain key words or phrases associated with intellectual property or
other sensitive data the organization wants to protect
digital watermark - Answer✔code embedded in documents that enables an organization to
identify confidential information that has been disclosed
data masking - Answer✔program that protects privacy by replacing personal information with
fake values
spam - Answer✔unsolicited emails that contain advertisements or offensive content
identity theft - Answer✔assuming someones identity, usually for economic gain
encryption - Answer✔process of transforming normal text, called plaintext, into unreadable
gibberish, called ciphertext
decryption - Answer✔process of turning ciphertext into plain text
symmetric encryption systems - Answer✔encryption systems that use the same key to both
encrypt and decrypt
asymmetric encryption systems - Answer✔encryption systems that use two keys (public and
private); either key can encrypt, but only the matching key can decrypt
public key - Answer✔used in asymmetric encryption systems, widely distributed and available
to everyone
private key - Answer✔used in asymmetric encryption systems, it is kept secret and known only
to the owner of that pair of public and private keys
key escrow - Answer✔process of storing a copy of an encryption key in a secure location
hashing - Answer✔transforming plaintext of any length into a shortcode - called a hash
nonrepudiation - Answer✔creating legally binding agreements that cannot be unilaterally
repudiated by either party
digital signature - Answer✔hash encrypted with hash creator's private key
digital certificate - Answer✔electronic document that certifies the identity of the owner of a
particular public key and contains that party's public key
2|Page