Chapter 10 CINS
Which of the following is commonly used by computer criminals to exploit human weaknesses by misrepresenting oneself to trick others into revealing information?
social engineering
In this video, Agent Macey explains how a _____ pretends to be a legitimate company by sending emails that request users to update their confidential information such as passwords or account numbers.
spoofer
Individuals who break into computer systems with the intention of doing damage are called __________.
crackers
Based on the information provided in this video, which of the following usually happens in a denial-of-service attack?
a hacker floods a web server with so many requests that the server becomes unavailable to intended users
__________ refers to the use of computer and networking technologies against persons or property to intimidate or coerce governments, civilians, or any segment of society to attain political, religious, or ideological goals.
cyberterrorism
An organized attempt by a nation's military to disrupt or destroy another nation's information and communication systems is known as __________.
cyberwar
In this video, Special Agent Macey states that the single largest threat to the internet is _____.
denial of service attacks
A(n) __________ is a computer, data, or network site that is designed to be enticing to crackers to detect, deflect, or counteract illegal activity.
honeypot
Which of the following is NOT a key component of information systems security?
implementing social engineering
According to the information provided in this video, any business that has an online presence is exposed to all the following risks EXCEPT _____.
increased exposure to losses due to natural disasters
According to the DHS agent portrayed in this video, the Secret Service has responded to network intrusions in the point-of-sale systems of numerous U.S. businesses that have been caused by _____.
malware