Chapter 7
A self-contained program that spreads through a computer network by exploiting security holes is called a worm
A program with a benign capability that conceals another, sinister purpose is called a trojan horse.
The __________________________ criminalizes a wide variety of hacker-related activities.
Computer Fraud and Abuse Act
Vote-counting irregularities in the State of _____________ in the 2000 U.S. Presidential election led to more interest in computerized voting systems.
Florida
The internet worm was released by
Robert Morris, Jr..
An intentional action designed to prevent legitimate users from making use of a computer service is called
a denial-of-service attack.
Anonymous is
a loosely organized group of hactivists that claimed responsibility for a DDoS attack on Church of Scientaology Web sites.
A file accompanying an email message is called an ________________.
attachment
Determining that a person is who he or she claims to be on a computer is called
authentication
The process of determining that a user has permission to perform a particular action on a computer is called
authorization
A software program that responsds to commands sent by a comand-and-control program locataed on an external computer is called a
bot
According to some estimates, 90 percent of spam is distributed through_______ networks.
bot
The Conficker worm is notable because
computer experts have found it particularly difficult to eradicate
An intentional action designed to prevent legitimate users from making use of a computer service is called a ___________________________.
denial-of-service (DoS) attack
A ___________ is a computer, positioned between a local network and the Internet, that monitors the packets flowing in and out.
firewall
You may find a virus
on a hard disk, on a floppy disk, on a CD-ROM, or in an email attachment
Manipulating someone within an organization to gain access to confidential information is called
social engineering
The manipulation of a person inside an organization to gain access to confidential information is called ______________.
social engineering
A _______ is a piece of self-replicating code embedded within another program called the host.
virus
A piece of self-replicating code embedded within another program is called a
virus
A _____________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.
worm