SEARCH
🇬🇧
MEM
O
RY
.COM
4.37.48
Guest
Log In
Â
Homepage
0
0
0
0
0
Create Course
Courses
Last Played
Dashboard
Notifications
Classrooms
Folders
Exams
Custom Exams
Help
Leaderboard
Shop
Awards
Forum
Friends
Subjects
Dark mode
User ID: 999999
Version: 4.37.48
www.memory.com
You are in browse mode. You must login to use
MEM
O
RY
  Log in to start
Index
 »Â
Living in The IT era
 »Â
Chapter6
 »Â
Issues and Challenges
level: Issues and Challenges
Questions and Answers List
level questions: Issues and Challenges
Question
Answer
Industry: With the introduction of computer systems at work, one main issue raised is:
maintaining the computer system's security and integrity
is a general term used to describe any type of software that can cause harm to a computer system.
Malware
Examples of malware include the following:
Virus Worm Trojan Spyware Ransomware
Malware: It is a computer program usually hidden within another program that inserts itself into other programs or files.
Virus
Malware: Virus: Once inside the computer system, it usually performs malicious actions such as:
destroying data or deleting processing files in the computer causing it to crash
Malware: is a stand-alone malware that replicates itself in order to spread to other computers.
worm
Malware: Worm: It almost always causes at least some harm to a computer system such as:
slowing down the network connection
Malware: Compared to a virus, a worm is:
causes less damage; however, a worm can also act as a virus by replicating itself, causing damage to multiple parts in the system
Malware: It refers to a malicious program which initially appears to be useful, routine, or interesting in order to persuade a victim to install it.
Trojan
Malware: Trojan: Unlike computer viruses and worms, Trojans:
generally do not attempt to inject themselves into other files or otherwise propagate themselves. However, a Trojan may contain a virus or a worm, which, once opened, can cause damage to the computer.
Malware: is a software that aims to gather information about an organization or a person without his or her knowledge.
Spyware
Malware: Spyware: an extension of this is called:
adware
Malware: Spyware: A more dangerous type of spyware is one that asserts control over a device without the user's knowledge, such as:
keystroke logging or spy cams
Malware: It is a type of malware that can block access to a victim's data.
Ransomware
Malware: Ransomware: Uses his or her technical knowledge or skills to gain unauthorized access to data or systems.
Hacker
Malware: Ransomware: more advances malware uses a technique called ???, in which the victim's files are encrypted, and the hacker would demand a ransom for the file to be decrypted.
Cryptoviral extortion
Malware: Ransomware: in cryptoviral extortion, The victim's files are ???, and the hacker would demand a ransom for the file to be ???.
encrypted decrypted
Malware: One of the most recent malware attack which has hit almost 74 countries, affecting several industries worldwide was the ransomware:
"WannaCry"
While online banking may be convenient, there are still skeptics to this given the sensitive data being transacted online: and that is?
money
Banking: What caused customers of Bank of the Philippine Islands (BPI) to either lose money from their accounts or receive huge amounts of money that were not theirs.
A supposed faulty system upgrade
Education: With online learning being accepted into schools as part of the teaching and learning methodology, one of the things that schools need to consider is:
monitoring and management
Is a program designed to display advertisements on your computer, redirect your search requests to advertising websites, and collect marketing-type data about yourself-- for example, the types of website that you visit-- so that customized advertisements can be displayed
adware
There are many ad-supported programs, games, or utilities that are distributed as adware, which is often called:
as freeware
In the Philippines, hospitals are required to comply with? and implement data protection measures in their data processing systems to protect the confidentiality of their patient's personal information and medical records.
Data Privacy Act (DPA) of 2012
Under the DPA (Data Privacy Act), the penalty for unauthorized disclosure of personal information is:
1 million pesos.
The penalty for unauthorized disclosure of personal information under the DPA (Data Privacy Act), if involves sensitive personal information, extends to:
2 million pesos
was designed in the United States to promote the confidentiality and portability of patient records, as well as to develop data security standards for consistency in the healthcare industry.
Health Insurance Portability and Accountability Act (HIPAA) in1996
Wat was published in the February 20,2003 issue of Federal Register with an effective date of April 21, 2003
The HIPAA Security Final Rule, the last of the three HIPAA rules.
The HIPAA Security Final Rule, the last of the three HIPAA rules, was published in the:
February 20, 2003 issue of Federal Register with an effective date of April 21, 2003