1 Criminal hackers, companies, and law enforcement agencies
employ similar tactics to obtain information.
True
False
2 which of the following constitutes the greatest threat to
information security?
System software
Actions and omissions of system designers and users
System hardware
Networking technology
3 The process of tracking your online activities including
online shopping habits, social media participation, and gaming
statistics is an example of:
Dataveillance
Digital Footprint
Private Information
Personal Information
4 Facebook postings, Yelp ratings, or Youtub video likes/...