IT 301 Ciampa Ch 1-3
False
(T) OR (F) Data backups only protect data against computer attacks.
True
(T) OR (F) Files backed up through online services can be made available to another computer.
True
(T) OR (F) Financial cybercrime is often divided into two categories. The first category focuses on individuals and businesses.
False
(T) OR (F) There is a straightforward and easy solution to securing computers.
Credit score
A ____ is a numerical measurement used by lenders to assess a consumer's creditworthiness.
Worm
A ____ is a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer.
Rootkit
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.
Trojan
A computer ___________________ is an executable program that contains hidden malware code.
Vulnerability
A(n) ____ is a flaw or weakness that allows a threat agent to bypass security.
Threat
A(n) ____ is a type of action that has the potential to cause harm.
Macro
A(n) ___________________ is a series of instructions that can be grouped together as a single command.
Hoax
A(n) ____________________ is a false warning, often contained in an e-mail message claiming to come from the IT department.
Social networking
Grouping individuals and organizations into clusters or groups based on their likes and interests is called ____.
Security
In a general sense, ____________________ can be defined as the necessary steps to protect a person or property from harm.
People
Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.
Pharming
Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.
Antivirus
One of the first software security applications is ____ software.
Rootkit
Originally the term ___________________ referred to a set of modified and recompiled tools for the UNIX operating system.
Advertising
Spyware usually performs one of the following functions on a user's computer: ____, collecting personal information, or changing computer configurations.
Digest
Technically speaking, the process for creating a password digital representation is based on a hash algorithm, which creates a(n) ____________________.
Social networking sites
The Web sites that facilitate linking individuals with common interests and function as an online community of users are called ____.
Password management tool
The best approach to establishing strong security with passwords is to use a ____.
Information Security
The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
HIPAA
Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
Availability
____ ensures that data is accessible when needed to authorized users.
Integrity
____ ensures that information is correct and no unauthorized person or malicious software has altered that data.
Swiss cheese
____ infection injects portions of the code throughout the program's executable code instead of only at the end of the file (any overwritten original code is transferred and stored inside the virus code for proper execution of the host program after the infection).
Phishing
____ is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise, in an attempt to trick the user into surrendering private information.
Dumpster Diving
____________________ involves digging through trash receptacles to find information that can be useful in an attack.
Conformity
____________________ is a group-based behavior, yet it can be used on an individual by convincing the victim that everyone else has been giving the attacker the requested information.