Quiz 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Auditing _____ the computer means inputs, outputs, and processing are checked.

through

____ is the possibility that the system will be attacked by a threat.

vulnerability

______ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.

Information Extortion

risk ___ means absorbing any damages that occur

acceptance

a _____ is an attack by a programmer developing a system.

back door

a firewall is a _____ control

communication

Security must be balanced with _____ for people to use systems

convenience

SCADA attacks typically occur on.

industrial control systems

a ______ is a remote attack requiring user action.

phishing attack

is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

social engineering


Set pelajaran terkait

Chapter 24 - Newborn Nutrition & Feeding (Maternity) EAQ's

View Set

Unit 6 - Inflammation, IBD, Pneumonia

View Set

Chapter 7 - Scripting with Python

View Set

Prokaryotic and Eukaryotic Cells

View Set

Troubles acquis - vocabulaire praxie + gnosie

View Set

Chapter 16 EMT Cardiovascular emergencies

View Set