1. All of the following are examples of real security and privacy risks EXCEPT





Write Comment

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Show Similar Question And Answers
QA->All of the following are the merits of a side valve(L.head) operating mechanism, except-....
QA->Breach of confidentiality and privacy....
QA->Real Madrid midfielder who has been named 2014 Sportsman of the Year by the AIPS (International Association of Latin American Sports Journalists) for his performances with Colombia in the 2014 World Cup and with Real Madrid?....
QA->WHICH DAY IS OBSERVED AS DATA PRIVACY DAY....
QA->Violation of privacy....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in ‘’bold’’ to help you locate them while answering some of the questions.As increasing dependence on information systems develops, the need for such system to be reliable and secure also becomes more essential. As growing numbers of ordinary citizens use computer networks for banking, shopping, etc., network security in potentially a ‘’massive’’ problem. Over the last few years, the need for computer and information security system has become increasingly evident, as web sites are being defaced with greater frequency, more and more denial-of-service attacks are being reported, credit card information is being stolen, there is increased sophistication of hacking tools that are openly available to the public on the Internet, and there is increasing damage being caused by viruses and worms to critical information system resources.At the organizational level, institutional mechanism have to be designed in order to review policies, practices, measures and procedures to review e-security regularly and assess whether these are appropriate to their environment. It would be helpful if organizations share information about threats and vulnerabilities, and implement procedures of rapid and effective cooperation to prevent, detect and respond to security incidents. As new threats and vulnerabilities are continuously discovered there is a strong need for co-operation among organizations and, if necessary, we could also consider cross-border information sharing. We need to understand threats and dangers that could be ‘’vulnerable’’ to and the steps that need to be taken to ‘’mitigate’’ these vulnerabilities. We need to understand access control systems and methodology, telecommunications and network security, and security management practise. We should be well versed in the area of application and systems development security, cryptography, operations security and physical security.The banking sector is ‘’poised’’ for more challenges in the near future. Customers of banks can now look forward to a large array of new offerings by banks, from an ‘’era’’ of mere competition, banks are now cooperating among themselves so that the synergistic benefits are shared among all the players. This would result in the information of shared payment networks (a few shared ATM networks have already been commissioned by banks), offering payment services beyond the existing time zones. The Reserve Bank is also facilitating new projects such as the Multi Application Smart Card Project which, when implemented, would facilitate transfer of funds using electronic means and in a safe and secure manner across the length and breadth of the country, with reduced dependence on paper currency. The opportunities of e-banking or e-power is general need to be harnessed so that banking is available to all customers in such a manner that they would feel most convenient, and if required, without having to visit a branch of a bank. All these will have to be accompanied with a high level of comfort, which again boils down to the issue of e-security.One of the biggest advantages accruing to banks in the future would be the benefits that arise from the introduction of Real Time Gross Settlement (RTGS). Funds management by treasuries of banks would be helped greatly by RTGS. With almost 70 banks having joined the RTGS system, more large value funds transfer are taking place through this system. The implementation of Core Banking solutions by the banks is closely related to RTGS too. Core Banking will make anywhere banking a reality for customers of each bank. while RTGS bridges the need for inter-bank funds movement. Thus, the days of depositing a cheque for collection and a long wait for its realization would soon be a thing of the past for those customers who would opt for electronic movement of funds, using the RTGS system, where the settlement would be on an almost ‘’instantaneous’’ basis. Core Banking is already in vogue in many private sector and foreign banks; while its implementation is at different stages amongst the public sector banks.IT would also facilitate better and more scientific decision-making within banks. Information system now provide decision-makers in banks with a great deal of information which, along with historical data and trend analysis, help in the building up of efficient Management Information Systems. This, in turn, would help in better Asset Liability Management (ALM) which, today’s world of hairline margins is a key requirement for the success of banks in their operational activities. Another benefit which e-banking could provide for relates to Customer Relationship Management (CRM). CRM helps in stratification of customers and evaluating customer needs on a holistic basis which could be paving the way for competitive edge for banks and complete customer care for customer of banks.The content of the passage ‘’mainly’’ emphasizes----
 ....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words are given in bold to help you answer some of the questions.At the heart of what makes India a better regime than China is a healthy respect for the civil rights and liberties of its citizens. There are checks and balances in our government. But India’s new surveillance programme, the Central Monitoring system (CMS), resembles a dystopian society akin to George Orwell’s 1984.According to several news reports, the CMS gives the government, Indian security agencies and income tax (IT) officials the authority to listen to, and tape phone conversions, read emails and text messages, monitor Posts on Facebook, Twitter or Linkedin and track searches on Google of selected targets, without oversight by the courts or parliament. To call it sweeping is an understatement.Typically, Indian Security agencies need a court order for surveillance, or depend on Internet/telephone service providers for data, provided they supply a warrant. CMS allows the government to bypass the court.  Milind Deora, India’s Minister of State for Information Technology says the new system will actually improve citizens’ privacy because telecommunication agencies would no longer be directly involved in the surveillance; only government officials would have these details – missing the point that in a democracy, there has to be freedom from government surveillance. This is hardly comforting in a nation riddled with governmental corruption.India does not have a privacy law. CMS will operate under the Indian Telegraph Act (ITA). The ITA is a relic of the British Raj from 1885, and gives the government the freedom to monitor private conversations. News reports quote anonymous telecommunications ministry officials as saying that CMS has been introduced for security purposes, and “this is to protect you and your country”.That is irrational. For one, there are no ‘security purposes’ that prevent the government from having a rational debate on this programme and getting approval from our elected representatives before authorizing such wide-reaching surveillance. If the government is worried that a public debate in a paralysed parliament would half the programme’s progress, then it can convene a committee of individuals or an individual body such as CAG to oversee the programme. It can seek judicial approval from the Supreme Court, and have a judge sign off on surveillance requests without making these requests public.As of now, the top bureaucrat in the interior ministry and his/her state level deputies will have the power to approve surveillance requests. Even the recently revealed US surveillance Programme, had ‘behind the doors’ bipartisan surveillance approval. Furthermore, US investigation agencies such as the CIA and NSA are not the ruling party’s marionettes; in India, that the CBI is an arm of the government is a fait accompli. Even the Supreme Court recently lambasted the CBI and asked it to guarantee its independence from government influences after it was proved that it shared unreleased investigation reports with the government.There is no guarantee that this top bureaucrat will be judicious or not use this as a tool to pursue political and personal vendettas against opposition parties or open critics of the government. Security purposes hardly justify monitoring an individual’s social media usage. No terrorist announces plans to bomb a building on Facebook. Neither do Maoists espouse Twitter as their preferred form of communication.Presumably, security purposes could be defined as the government’s need to intercept terrorist plans. How does giving the IT department the same sweeping surveillance powers justify security purposes? The IT office already has expansive powers to conduct investigations, summon individuals or company executives, and raid premises to catch tax evaders. In a world where most financial details are discussed and transferred online, allowing the IT departments to snoop on these without any reasonable cause is akin to airport authorities strip searching everyone who boards a flight.What happened on 26/11 or what happens regularly in Naxal – affected areas is extremely sad and should ideally, never take place again. But targeting terrorists means targeting people who show such inclinations, or those who arouse suspicions, either by their travels or heir associations with militant or extremist groups. And in a country where a teenager has been arrested for posting an innocent comment questioning the need for a bandh on the death of a political leader, gives us reason to believe that this law is most likely to be misused, if not abused. Select the word which is MOST OPPOSITE in meaning to the word printed in bold, as used in the passage. AKIN....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words have been printed in ‘’bold’’ to help you locate them while answering some of the questions.The evolution of Bring Your Own Device (BYOD) trend has been as profound as it has been rapid. It represents the more visible sign that the boundaries between personal life and work life are blurring. The 9 a.m. - 5 p.m. model of working solely from office has become archaic and increasingly people are working extended hours from a range of locations. At the very heart of this evolution is the ability to access enterprise networks from anywhere and anytime. The concept of cloud computing serves effectively to extend the office out of office. The much heralded benefit of BYOD is greater productivity. However, recent research has suggested that this is the greatest myth of BYOD and the reality is that BYOD in practise poses new challenges that may outweigh the benefits. A worldwide commissioned by Fortinet choose to look at attitudes towards BYOD and security from the user’s point of view instead of the IT managers. Specifically the survey was conducted in 15 territories on a group of graduate employees in their early twenties because they represent the first generation to enter the workplace with an expectation of own device use. Moreover, they also represent tomorrow’s influences and decision markers. The survey findings reveals that for financial organizations, the decision to embrace BYOB is extremely dangerous. Larger organizations will have mature IT strategies and policies in place. But what about smaller financial business? They might not have such well developed strategies to protect confidential data. Crucially, within younger employee groups, 55% of the people share an expectation that they should be allowed to use their own devices in the workplace or for work purposes. With this expectation comes the very real risk that employees may consider contravening company policy banning the use of own devices. The threats posed by this level of subversion cannot be overstated. The survey casts doubt on the idea of BYOD leading to greater productivity by revealing the real reason people want to use their own devices. Only 26% of people in this age group cite efficiency as the reason they want to use their own devices, while 63% admit that the main reason is so they have access to their favourite applications. But with personal applications so close to hand, the risks to the business must surely include distraction and time wasting. To support this assumption 46% of people polled acknowledged time wasting as the greatest threat to the organization, while 42% citing greater exposure to theft or loss of confidential data. Clearly, from a user perspective there is great deal of contradiction surroundings BYOB and there exists an undercurrent of selfishness where users expect to use their own devices, but mostly for personal interest. They recognize the risks to the organization but are adamant that those risks are worth talking.According to the passage, for which of the following reasons did Fortinet conduct the survey on a group of graduate employees in their early twenties?A: As this group represents the future decision makers B: As this group represents the first generation who entered the workforce with a better understanding of sophisticated gadgets C: As this group represents the first generation to enter the workplace expecting that they can use their own devices for work purpose....
MCQ-> Read the following passage carefully and answer the given questions. Certain words/phrases have been given in bold to help you locate them while answering some of the questions. Virtual currencies are growing in popularity. While the collective value of virtual currencies is still a fraction of the total U.S. Dollars in circulation, the use of virtual currencies as a payment mechanism of transfer of value is gaining momentum. Additionally, the number of entities (issuers, exchangers and intermediaries, to name just a few) that engage in virtual currency transactions is increasing and these entities often need access to traditional banking services.Virtual currencies are digital representations of value that function as a medium of exchange, a unit of account and a store of value (buy now redeem later policy). In many cases, virtual currencies are “convertible” currencies; they are not legal lenders, but they have an equivalent value in real currency. Despite what seems to be a tremendous interest in virtual currencies their overall value is still extremely small relative to other payment mechanisms, such as cash, cheques and credit and debit cards. The virtual currency landscape includes many participants from the merchant that accepts the virtual currency, to the intermediary that exchanges the virtual currency on behalf of the merchant, to the exchange that actually converts the virtual currency to the real currency to the electronic wallet provider that holds the virtual currency on behalf of its owner. Accordingly, opportunities abound for community banks to provide services to entities engaged in virtual currency activities. Eventually, it is also possible that community banks may find themselves holding virtual currency on their own balance sheets.Launched in 2009, Silicon is currently the largest and most popular virtual currency. However, many other virtual currencies have emerged over the past few years, such as Litecoin, Dogecoin, Peercoin and these provide even more anonymity to its users than that provided by Bitcoin.As the virtual currency landscape is fraught with dangers, what important risks should community bankers consider?The most significant is compliance risk- a subset of legal risk. Specifically, virtual currency administrators or legal exchangers may present risks similar to other money transmitters, as well in presenting their own unique risks. Quite simply, many users of virtual currencies do so because of the perceptions that transactions conaucted using virtual currencies are anonymous. The less-than transparent nature of the transactions, :nay make it more difficult for a inancial institution to truly know and understand the activities of its customer and whether the customer’s activities are legal. Therefore, these transactions may present a higher risk for banks and require additional due diligence and monitoring.Another important risk for community banks to consider is credit risk. How should a community bank respond if a borrower wants to specifically post Bitcoin or another virtual currency as collateral for a loan? For many, virtual currencies are simply another form of cash, so it is not hard to analyse that bankers will face such a scenario at some point. In this case, caution is appropriate. Bankers should carefully weigh the pros and cons of extending any loan secured by Bitcoin or other virtual currencies (in whole or in part), or where the source of loan repayment is in some way dependent on the virtual currency. For one, the value of Bitcoin in particular has been volatile. Then, the collateral value could fluctuate widely from day-to-day. Bankers also need to think about control over the account. ‘How does the banker control access to a virtual wallet, and how can it control the borrower’s access to the virtual wallet? In the event of a loan default, the bank would need to take control of the virtual currency. This would require access to the borrower’s virtual wallet and private key. All of this suggests that the loan agreement needs to be carefully crafted and that additional steps need to be taken to ensure the bank has a perfected lift on the virtual currency.Virtual currencies bring with them, both opportunities and challenges, and they are likely here to stay. Although, it is too early to determine just how prevalent they will be in the coming years, we too expect that the virtual participants in the virtual currency ecosystem will increasingly intersect with the banking industry.Which of the following is the meaning of the phrase ‘fraught with dangers’ as mentioned in the passage?
 ....
MCQ-> Read the following passage carefully and answer’ the questions. Certain words/phrases are given in bold to help you locate them while answering some of the questions.Since its creation in the 17th century, insurers have amassed policies in each class of risk they cover. Thanks to technology, insurers now have access to more and more information about the risks that individuals run. Car insurers have begun to set premiums based on how actual drivers behave, with “telematic” tracking devices to show how often they speed or slam, on the brakes. Analysts at Morgan Stanley, a bank, predict that damage to insured homes will fall by 4060% if smart sensors are installed to monitor, say, frayed electrical wiring. Some health insurers provide digital fitness bands to track policyholders’ vital signs— and give discounts if they lead a healthier life. But the data can °lily go so far. Even the safest driver can be hit by a falling tree; people in connected homes still fall off ladders, but the potential gains from smart insurance are  large. First, giving people better insights into how they are managing risk should help them change their behaviour for the better. Progressive, an American car insurer, tells customers who use its trackers where they tend to drive unsafely; they crash less often as a result. Second, pricing will become keener for consumers. The insurance industry made $338 billion in profits last year. More accurate risk assessment should result in lower premiums for many policyholders. Third, insurers should be able to spot fraud more easily, by using data to verify claims.But two worries stand out. One is a fear that insurers will go from being companies you hope never to deal with to ones that watch your every move. The other, thornier problem is that insurers will cherry pick the good risks, leaving some people without a safety net or to be taken care of by the state. Forgone privacy is the price the insured pay for receiving personalised pricing. Many people are indeed willing to share their data, but individuals should always have to opt in to do so. Some worry that this safeguard may not be enough; the financial costs of not sharing data may be so great that people have no real choice over whether to sign up. The second concern is the worry that more precise underwriting will create a class of uninsurable people, selected out of insurers’ businesses because they are too high a risk. For some types of cover, that would be a reasonable outcome. People who choose to drive like maniacs should have a hard time getting insurance. By the same token, it makes sense to offer rewards, in the form of discounts to premiums, to customers who behave well. Incentivising people to eat better, exercise regularly, drink in moderation and avoid smoking would reap huge health dividends. Where things get harder is with risks that individuals can not control. There are few things that people have less choice about than their genes. One option is to distort the market by requiring insurers to be blind to genetic data. In 2011, for example, Europe banned insurers from using gender to calculate annuities. Now that a man’s shorter lifespans are no longer taken into account that has led to lower payments. Until the interplay between nature and nurture is better understood, it is right to be cautious. Insurers should be able to take note of customers’ behaviour, but not exploit information from genetic testing. However, as data analysis and the understanding of genetics improve, that line will only become harder to hold.Which of the following can be said about the insurance industry ?
 ....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions