logo image

COB 204 Chapter 12

A _____ is a person or organization that seeks to obtain data or other assets illegally, without the owner’s permission and often without the owner’s knowledge.
threat
Which of the following is considered a computer crime?
hacking of information systems
_____ occurs when someone deceives by pretending to be someone else.
Pretexting
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of _____.
unauthorized data disclosure
A _____ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
phisher
Email spoofing is a synonym for _____.
phishing
_____ is a technique for intercepting computer communications, either through a physical connection to a network or without physical connection in the case of wireless networks.
Sniffing
Which of the following is an example of a sniffing technique?
Adware
_____ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.
Hacking
Which of the following usually happens in a malicious denial-of-service attack?
A hacker floods a web server with millions of bogus service requests.
_____ present the largest risk for an organization’s infrastructure loss.
Natural disasters
_____ are small files that your browser stores on your computer when you visit web sites and enable you to access web sites without having to sign in every time.
Cookies
Which of the following is a critical security function senior management in an organization?
Establishing the security policy and managing risk
The Privacy Act of 1974 provides protection to individuals regarding ______.
records held by the US government
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?
HIPAA of 1996
Which of the following is an example of a technical safeguard?
Firewalls
Users of smart cards are required to enter a _____ to be authenticated.
personal identification number
Which of the following is used for biometric authentication?
Facial features
______ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.
Encryption
Secure Socket Layer is also known as _____.
transport layer security
You are transferring funds online through the web site of a reputed bank. Which of the following displayed in your browser’s address bar will let you know that the bank is using the SSL protocol?
https
A _____ examines each part of a message and determines whether to let that part pass.
packet-filtering firewall
_____ is the term used to denote viruses, worms, and trojan horses.
Malware
What is the major difference between spyware and adware?
Unlike spyware, adware does not perform malicious acts.
In a locked room, maintaining the computers of an organization that run the DBMS is a part of ______.
physical security procedures
_____ involve the people and the procedure components of information systems.
Human safeguards
_____ are the primary means of authentication and are important not just for access to a user’s computer, but also for authentication to other networks and servers to which the user may have access.
Passwords

Need essay sample on "COB 204 Chapter 12"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy