ISM 280 Chapter 10 Video Exercise: Information Security Management
In this video, Agent Macey explains how a _____ pretends to be a legitimate company and sends emails that request recipients to update their confidential information such as passwords or account numbers.
spoofer
Based on the information provided in this video, which of the following usually happens in a denial-of-service attack?
A hacker floods a Web server with so many requests that the server becomes unavailable to intended users.
According to the information provided in this video, any business that has an online presence is at risk of _____.
all of these answers
In this video, Special Agent Macey says the single largest threat to the Internet is _____.
denial-of-service attacks
According to the DHS agent portrayed in this video, the Secret Service has responded to network intrusions in the point-of-sale systems of numerous U.S. businesses that have been caused by _____.
malware