Chapter 10 CINS

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is commonly used by computer criminals to exploit human weaknesses by misrepresenting oneself to trick others into revealing​ information?

social engineering

In this​ video, Agent Macey explains how a​ _____ pretends to be a legitimate company by sending emails that request users to update their confidential information such as passwords or account numbers.

spoofer

Individuals who break into computer systems with the intention of doing damage are called​ __________.

crackers

Based on the information provided in this​ video, which of the following usually happens in a​ denial-of-service attack?

a hacker floods a web server with so many requests that the server becomes unavailable to intended users

__________ refers to the use of computer and networking technologies against persons or property to intimidate or coerce​ governments, civilians, or any segment of society to attain​ political, religious, or ideological goals.

cyberterrorism

An organized attempt by a​ nation's military to disrupt or destroy another​ nation's information and communication systems is known as​ __________.

cyberwar

In this​ video, Special Agent Macey states that the single largest threat to the internet is​ _____.

denial of service attacks

​A(n) __________ is a​ computer, data, or network site that is designed to be enticing to crackers to​ detect, deflect, or counteract illegal activity.

honeypot

Which of the following is NOT a key component of information systems​ security?

implementing social engineering

According to the information provided in this​ video, any business that has an online presence is exposed to all the following risks EXCEPT​ _____.

increased exposure to losses due to natural disasters

According to the DHS agent portrayed in this​ video, the Secret Service has responded to network intrusions in the​ point-of-sale systems of numerous U.S. businesses that have been caused by​ _____.

malware


Ensembles d'études connexes

Rule 1.6 -- Confidentiality/Attorney-Client Privilege/Work Product

View Set

Abnormal Psych Chapter 8 Online Exam

View Set

(Your vs You're) & (Yours vs Your's)

View Set

Bus Strategy: MGMT 498 CH 12 Quiz

View Set

Final Exam All Material, Final Exam New Material, Exam 4 All Questions, NUR 112 Exam 3 ALL QUESTIONS

View Set

سؤال وجواب في التاريخ الاسلامي

View Set