Chapter 8 Securing Information Systems

156) An ________ defines acceptable uses of the firm’s information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet.

157) ________devises plans for the restoration of computing and communications services after they have been disrupted.

158) A ________is a physical device, similar to an identification card, that is designed to prove the identity of a single user.

159) A ________is a device about the size of a credit card that contains a chip formatted with access permission and other data.

160) ________uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access.

161) A ________ is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

162) ________ examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet, examining individual packets in isolation.

163) ________feature full-time monitoring tools placed at the most vulnerable points or “hot spots” of corporate networks to detect and deter intruders continually.

164) ________is designed to check computer systems and drives for the presence of computer viruses.

165) ________is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver.

166) ________ encryption uses two keys: one shared (or public) and one private.