INFO Ch8
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:
Click fraud
A foreign country attempting to access government networks in order to disable a national power grid would be an example of:
Cyberwarfare
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ___ attack.
DDoS
___ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
Identity theft
___ refers to the policies, procedures, and tech measures used to prevent unauthorized access to IS.
Security
An example of phishing is:
Setting up fake medical website that asks users for confidential information
Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called:
Social engineering
A keylogger is a type of:
Spyware
Which of the following is the single greatest cause of network security breaches?
User lack of knowledge
A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as:
War driving
An independent computer program that copies itself from one computer to another over a network is called a:
Worm