Front | Back |
A(n) _________________________ is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
|
Computer security risk
|
Any illegal act involving a computer generally is referred to as a(n) ____________________.
|
Computer crime
|
The term ____________________ refers to online or Internet-based illegal acts.
|
Cybercrime
|
A(n) ____________________ has the same intent as a cracker but does not have the technical skills and knowledge.
|
Script kiddie
|
A(n) ____________________ is someone who uses e-mail as a vehicle for extortion.
|
Cyberextortionist
|
A(n) ____________________ is someone who uses the Internet or network to destroy or damage computers for political reasons.
|
Cyberterrorist
|
A(n) ____________________ is the destructive event or prank malware is intended to deliver.
|
Payload
|
A(n) ____________________ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
|
Antivirus program
|
____________________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
|
Spoofing
|
_________________________ automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls.
|
Intrusion detection software
|
Many Web sites require a user to enter a(n) ____________________, which is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.
|
Username or
user name |
Many Web sites require a user to enter a(n) _________________________, which is a private combination of characters associated with a user name that allows access to certain computer resources.
|
Password
|
____________________ is the act of stealing computer equipment.
|
Hardware theft
|
14.
____________________ occurs when someone steals software media, intentionally erases programs, or illegally copies a program
|
Software theft
|
To protect themselves from software piracy, software manufacturers issue a(n) ____________________, which gives users the right to use the software.
|
License agreement
|