Quiz 4

Ace your homework & exams now with Quizwiz!

Auditing _____ the computer means inputs, outputs, and processing are checked.

through

____ is the possibility that the system will be attacked by a threat.

vulnerability

______ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.

Information Extortion

risk ___ means absorbing any damages that occur

acceptance

a _____ is an attack by a programmer developing a system.

back door

a firewall is a _____ control

communication

Security must be balanced with _____ for people to use systems

convenience

SCADA attacks typically occur on.

industrial control systems

a ______ is a remote attack requiring user action.

phishing attack

is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

social engineering


Related study sets

Chapter 24 - Newborn Nutrition & Feeding (Maternity) EAQ's

View Set

Unit 6 - Inflammation, IBD, Pneumonia

View Set

Chapter 7 - Scripting with Python

View Set

Prokaryotic and Eukaryotic Cells

View Set

Troubles acquis - vocabulaire praxie + gnosie

View Set