1. Usually targeting the accounting department, these attacks are electronic theft of very small amounts numerous times, such as rounding of fractions of a cent from interest calculations F. salami attacks
2. A form of social engineering, the attacker fishes for sensitive, private data, such as using an authentic-looking fraudulent Web site H. phishing
3. Attacks involving manipulating and tricking individuals into divulging confidential information, such as imposter emails G. social engineering
4. Social engineering attacks that involve creating a scenario and using deception for information gathering purposes D. pretexting
5. Rummaging through garbage for discarded documents or digital media I. dumpster diving
6. Attempts to obtain passwords by reading messages sent on a network E. password sniffing
7. Involves collecting, examining, and preventing evidence of cybercrime C. cyber forensics
8. Crimes connected to information assets and IT A. cybercrime
9. Laws and regulations to prevent, investigate, and prosecute cybercrimes B. cyberlaw
11.12
1. Malicious software that executes when a specified event occurs, such a logging into a bank account D. logic bombs
2. Malware sent by email that can be a virus, Trojan horse, worms, logic bombs, or bots F. spam
3. Malware disguised as a legitimate program B. Trojan horse
4. Tiny pieces of programming code that install themselves on an infected computer called a Zombie and transmit data back to the hackers’ computer without awareness of the Zombie computer user E. bots
5. Relatively small programs that infect other application software by attaching to it and disturbing application functioning A. viruses
6. Similar to viruses except they do not need a host application to function or reproduce C. worms
11.17
1. A small sequence of programming code inserted into a program to fix an error or add a new feature F. patch
2. Network hardware and software C. network architecture
3. Application software executing that runs a group of transactions at a later time H. batch
4. Application software execution that processes transactions at the current time G. real-time
5. Computer hardware components and computer software B. computer architecture
6. Computer programs for a specific application, such as accounting E. application software
7. A blueprint for computers, networks, and databases A. IT architecture
8. Computer programs used for managing computer hardware D. system software
11.18
1. A network that covers a large geographic region, such as several states C. wide area network (WAN)
2. A device connecting an enterprise intranet to the Internet K. gateways
3. Special purpose computers that monitor network G. routing devices
4. A software program that provides routing services to messages transmitted over the Internet N. internet protocol
5. A network that allows computers to request data and other services from other specific computers on the network Q. client/server network
6. A group of the same type of LANs connected to each other by bridges I. LAN cluster
7. A network covering a city B. metropolitan area network (MAN)
8. A software program commonly used to connect computers on a LAN M. ethernet protocol
9. A computer that serves other computers with data and applications, such as an accounting database E. server computers
10. A software program that allows the enterprise network to connect to the network of vendors through proprietary lines P. electronic data interchange (EDI)
11. Utility devices connected to a network for shared use, such as a printer F. peripherals
12. A personal computer or laptop connected to a network D. workstation computers
13. Physical media connecting computers L. network wiring (transmission media)
14. A software program that provides transportation services to messages sent over the Internet O. transport control protocol (TCP)
15. Computer connected in a relatively small area, such as your college campus A. local area network (LAN)
16. A network that allows an organization to share data with suppliers R. value-added network
17. An electronic device that connects networks of different types J. routers
18. A device that connects two LANs of the same type H. bridges
11.19
1. A provider of online applications, such as accounting applications, for a fee L. application service providers (ASP)
2. A proactive approach to enterprise security that involves developing an overall plan B. enterprise security architecture
3. A network software program that connects one computer to another computer H. point-to-point protocol (PPP)
4. An Internet protocol that allowed the creation of the World Wide Web M. hypertext transfer protocol (HTTP)
5. An enterprise-wide network D. intranet
6. A software program permitting an employee to use the enterprise network through a secure channel J. point-to-point tunneling protocol (PPTP)
7. A point on the network that offers access to the network, such as an accountant’s computer D. intranet
8. A provider of access to the Internet for a fee K. internet service provider (ISP)
9. Online sales transactions O. e-commerce
10. A network that provides a secure channel to access the enterprise network
11. Electrical transmission of data through analog or digital networks C. telecommunications
12. A wide network used by external customers and suppliers E. extranet
13. Accessing a computer from a remote location G. remote access
14. Tossing in security patches, hoping to cover vulnerabilities A. stovepipe
15. Located on a proxy server and used to intercept an inspect all incoming messages prior to delivering them to the intended recipient P. proxy firewall
16. A Web site address N. uniform resource locator (URL)
You May Also Find These Documents Helpful
-
14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…
- 284 Words
- 1 Page
Satisfactory Essays -
* Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.…
- 275 Words
- 1 Page
Satisfactory Essays -
2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…
- 595 Words
- 3 Pages
Good Essays -
Social engineering is being used to by tricking people into giving out information that is not normally publicly available.…
- 567 Words
- 3 Pages
Satisfactory Essays -
4. It is a program in which malicious or harmful code is disguised inside some apparently harmless programming or data.…
- 393 Words
- 2 Pages
Satisfactory Essays -
A piece of unwanted computer software or code introduced into another program, attached to a document or exists on its own, for malicious purposes.…
- 932 Words
- 4 Pages
Better Essays -
Spyware has quickly become the most prevalent threat to a computer system. Not too long ago the biggest threat to a computer system was a virus which is small computer program that copies itself from one computer to the next, with the intent of harming the computer system’s data and performance. The other major threat was spam which is seemingly not as catastrophic as a virus. Spam also known as unsolicited bulk email is when a company or person sends out the same email message to a large group of recipients indiscriminately.…
- 2042 Words
- 9 Pages
Better Essays -
A general term for software that is designed to destroy or disrupt data or do other unwanted actions in a computer system.…
- 1399 Words
- 6 Pages
Satisfactory Essays -
1) Security attacks – action that compromises the security of information owned by an organization.…
- 788 Words
- 4 Pages
Satisfactory Essays -
a) organization mission – organization strategic plan – IS strategic plan – new IT architecture…
- 4652 Words
- 19 Pages
Good Essays -
True or False: A computer worm consists of segments of code that perform malicious actions.…
- 491 Words
- 2 Pages
Satisfactory Essays -
Provide three specific examples of how the Internet has aided criminal activity. One of the examples could be considered as identity theft. Identity theft is the use of one person 's personal information by another to commit fraud or other crimes. The most common forms of identity theft occur when someone obtains another person 's social security number, driver 's license number, date of birth, and the like and uses it to open a fraudulent bank, credit card, cellular telephone, or other account, or to obtain false…
- 1217 Words
- 5 Pages
Better Essays -
If the consumer spends their money according to their financial plan it would be successful.…
- 402 Words
- 2 Pages
Satisfactory Essays -
A(n) ____ attack is a hacker using a personal computer to break into a system.…
- 760 Words
- 4 Pages
Satisfactory Essays -
The fraud begins mostly in two ways, either by the theft of the corporeal card or by the negotiation of data related with the account including all the information. The compromise can occur by many common routes and one of the ways which’s typically used is warning the card holder, until the account is ultimately used for fraud. Here’s an example where a store clerk is copying sales receipts so he can use them later. Using credit card on internet…
- 1919 Words
- 8 Pages
Powerful Essays