MKGT 439 ch. 5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

malware infection

According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?

worm/Trojan horse

Netsky.P, which spreads by sending e-mails from an infected computer to all of the e-mail addresses found on that infected computer, is an example of a:

stored value payment system

P2P payment systems are a variation on what type of payment system

NFC

a set of short-rang wireless technologies used to share information among devices within about 2 inches of each other

debit cards enable consumers to make purchases even if they do not have sufficient funds at the time of purchase

all of the following statements about debit cards are true except

PKI guarantees that the verifying computer of the merchant is secure

all the following are true about PKI except

your online purchasing history being sold to other merchants without your concent

an example of privacy violation of e-commerce security is

phishing attacks

botnets are typically used

45

computer security institute reported in its 2011 survey that approximately ____ percent of responding organizations experienced a computer security incident within the previous 12 months

availability

dimensions of e-commerce security is not provided for by encryption

credit cards

examples of stored value payment systems except

perform a risk assessment

first step in developing an e-commerce security plan

ISPs

following are stakeholders in payment systems except

firewall

hardware/software that acts as a filter to prevent unwanted packets from entering a network

drive-by download

malware that comes with a downloaded file that user requests is called a

the hacking and looting of corporate servers storing credit card information

most frequent cause of stolen credit cards and card information today

Melissa worm spreads through microsoft word templates

not a computer crime committed in 2011-2012

it provides float

not a feature of cash

the credit card companies

not a key point of vulnerability when dealing with e-commerce

drive-by download

not an an example of a PUP

digital signatures

not an example of an access control

symmetic key encryption is computationally slower

not true about symmetric key encryption

less than 1

overall rate of online credit card fraud is ____ percent of all online card transactions

computer fraud and abuse act

primary federal statute used to combat computer crime

dual home systems

proxy servers are also known

availability

refers to the ability to ensure that an e-commerce site continues to function as intended

nonrepudiation

refers to the ability to ensure that e-commerce participants do not deny their online actions

confidentially

six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy and

spyware

software that used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as


संबंधित स्टडी सेट्स

Introduction to Social Work - HS1 TEST 4

View Set

Module 4: Properties of a Well Written Text

View Set

Langage amoureux (love language)

View Set

Accounting Ch.2 Required and Optional Notes

View Set

Chapter 8--Organizing and Outlining

View Set

Econ203 Chapter 5.4-5.5 & Appendix

View Set