Quiz 4
Auditing _____ the computer means inputs, outputs, and processing are checked.
through
____ is the possibility that the system will be attacked by a threat.
vulnerability
______ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.
Information Extortion
risk ___ means absorbing any damages that occur
acceptance
a _____ is an attack by a programmer developing a system.
back door
a firewall is a _____ control
communication
Security must be balanced with _____ for people to use systems
convenience
SCADA attacks typically occur on.
industrial control systems
a ______ is a remote attack requiring user action.
phishing attack
is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
social engineering