Question: Question 1 Students should read each question carefully and choose the ONE best answer from the table to fill in the blank. Each question carries

 Question 1 Students should read each question carefully and choose the

Question 1 Students should read each question carefully and choose the ONE best answer from the table to fill in the blank. Each question carries 2 marks. [20 points) Phishing Integrity Morals Risk assessment Privacy Denial of service Bribery Ethics Security policy Malware Business Software Alliance Spyware Hacker Phishing Vulnerability Freedom of Information Social audit Rootkits Fraud Spam is a crime of obtaining goods, services, or property through deception or trickery. 2. Providing money, property, or favors to obtain a business advantage is known as 1. 3 are set of programs that enables its user to gain administrator- level access to a computer without the end user's consent or knowledge. 4. A is an organization's review of potential threats to its computers and network and the probability of those threats occurring 5. Abuse of email systems to send unsolicited email to large numbers of people is called a 6. The Act provides the public with the means to gain access to certain government records 7. The security requirements of an organization and the controls and sanctions used to meet those requirements are known as 8. is stealing personal identity data by tricking users into entering information on a counterfeit Web site. is the right to be left alone, the most comprehensive of rights, and the right most valued by a free people. 9. 10. is a cornerstone of ethical behaviour and is the practice of acting in accordance with one's own code of principles

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!