Front | Back |
A(n) ______ is an object, person, or other entity that represents an ongoing danger to an asset.
|
Threat
|
Duplication of software-based intellectual property is more commonly known as software ______.
|
Piracy
|
A computer virus consists of segments of code that perform ______ actions.
|
Malicious
|
A(n) ________ is a malicious program that replicates itself constantly, without requiring another program environment.
|
Worm
|
A virus or worm can have a payload that installs a(n) ___ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.
|
Back
|
A momentary low voltage is called a(n) ____.
|
Sag
|
Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive _________.
|
Intelligence
|
When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial _______.
|
Espionage
|
The expert hacker sometimes is called _____ hacker.
|
Elite
|
Script ______ are hackers of limited skill who use expertly written software to attack a system.
|
Kiddies
|
A(n) _______ hacks the public telephone network to make free calls or disrupt services.
|
Phreaker
|
ESD means electrostatic _____.
|
Discharge
|
A(n) _____ is an act that takes advantage of a vulnerability to compromise a controlled system.
|
Attack
|
A(n) _______ is an identified weakness in a controlled system, where controls are not present or are no longer effective.Feedback
|
Vulnerability
|
Attempting to reverse-calculate a password is called _______.
|
Cracking
|