Problem 23
For Exercises 1-27, mark the answers true or false as follows: A. True B. False The Internet can create a false sense of anonymity.
Problem 25
For Exercises 1-27, mark the answers true or false as follows: A. True B. False A website's security policy describes the constraints and behaviors that an organization embraces regarding information management.
Problem 26
For Exercises 1-27, mark the answers true or false as follows: A. True B. False Many mobile phones collect and store location data that can then be read and used by third parties, such as law enforcement.
Problem 28
Exercises 28-55 are problems or shortanswer questions. What is the CIA triad of information security?
Problem 29
Exercises 28-55 are problems or shortanswer questions. Other than those presented in this chapter, give three examples of data integrity violations.
Problem 31
Exercises 28-55 are problems or shortanswer questions. List at least four guidelines related to password creation and management.
Problem 32
Exercises 28-55 are problems or shortanswer questions. Is "diningroom" a good password? Why or why not?
Problem 33
Exercises 28-55 are problems or shortanswer questions. Is "fatTony \(99^{\prime \prime}\) a good password? Why or why not?
Problem 34
Exercises 28-55 are problems or shortanswer questions. What is password management software?
Problem 35
Exercises 28-55 are problems or shortanswer questions. What is the goal of a CAPTCHA interaction?