5 Questions
What are the five factors contributing to the increasing vulnerability of information resources?
Human errors, social engineering, technological advancements, lack of security policies, and globalization
What is an example of a deliberate software attack?
Denial of Service (DoS)
What are the three major types of controls that organizations can use to protect their information resources?
Physical controls, technical controls, and administrative controls
What does information security refer to?
Processes and policies designed to protect an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
What is an example of a threat to an information resource?
Unauthorized access
Test your knowledge of information security and ethics with this quiz. Covering topics such as the increasing vulnerability of information resources, human mistakes, social engineering, and deliberate software. Ideal for students studying fundamentals of information technology.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free