Podcast
Questions and Answers
Which of the following is NOT a key component of information ethics?
Which of the following is NOT a key component of information ethics?
- Creating viruses (correct)
- Distributing software
- Using software
- Copying software
What is the first line of defense in protecting intellectual assets?
What is the first line of defense in protecting intellectual assets?
- People (correct)
- Databases
- Technology
- Data
What can information not do?
What can information not do?
- Delete or preserve itself (correct)
- Send viruses
- Send spam
- Stop itself from sending sensitive information
What is the cost range of downtime for an organization, as mentioned in the text?
What is the cost range of downtime for an organization, as mentioned in the text?
What are the three types of security threats mentioned in the text?
What are the three types of security threats mentioned in the text?
Which of the following is NOT mentioned as a security threat in the text?
Which of the following is NOT mentioned as a security threat in the text?
What is the second line of defense in protecting intellectual assets?
What is the second line of defense in protecting intellectual assets?
What is the main focus of information ethics?
What is the main focus of information ethics?
What can individuals do with organizational databases according to the text?
What can individuals do with organizational databases according to the text?
What is the potential cost range of downtime for an organization?
What is the potential cost range of downtime for an organization?