_____ is software that displays a fictitious warning to the user in the attempt to "scare" the user into an action, such as purchasing additional software online to fix a problem that in fact does not exist.
Users generally resist Adware because:
Two types of malware that have the primary objective of spreading are:
________ is a malicious program designed to take advantage of vulnerability in an application or an operating system in order to enter a computer.
A________ is written in a script known as a macro.
Grouping individuals and organization into clusters based on their likes and interest is called________.
A long and complex password is a_______
The process of providing proof that the user is "genuine" or authentic is known as:
One of the most common social engineering is
is a means of gathering information for an attack by relying on the weaknesses of individuals.
means to create a fictitious character and then play out the role of that person on a victim.
is a false warning, often contained in an e-mail message claiming to come from the IT department.
attacks that rely on physical acts, these attacks take advantage of user actions that can result in weak security, two most common are______ and______.
what are the three types of Authentication?
There are two primary offline cracking techniques
There are 4 key elements to creating a practical security strategy which are
________ensures that only authorized parties can view the information.
In general sense "security" is
protecting information is accomplished by:
A_____ is used as a generic term used to describe individuals who launch attacks against other users and their computers.
Generally these attacks are intended to promote a political agenda and are in retaliation for a prior event.
Are also motivated by ideology.
There are three protection that must be extended over protection
There is a straightforward and easy solution to securing computers.
Attack tools can initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.
Today, many attack tools are freely available and do not require any technical knowledge to use.
Financial cybercrime is often divided into two categories. The first category focuses on individuals and businesses.
In a well-run information security program, attacks will never get through security perimeters and local defenses.
On average it takes ____ days for a victim to recover from an attack.
In the last year, over 600,000 Apple Macs were infected with a malicious software called ____.
“____” involves breaking into a car’s electronic system.
From January 2005 through July 2012, over ____ electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers.
Attackers today use common Internet ____ and applications to perform attacks, making it difficult to distinguish an attack from legitimate traffic.
Security ____ convenience.
The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
____ ensures that information is correct and no unauthorized person or malicious software has altered that data.
____ ensures that data is accessible when needed to authorized users.
Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.
A(n) ____ is a type of action that has the potential to cause harm.
A(n) ____ is a person or element that has the power to carry out a threat.
A(n) ____ is a flaw or weakness that allows a threat agent to bypass security.
____ involves stealing another person’s personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.
Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
____ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
The FBI defines ____ as any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.”
In the past, the term ____ was commonly used to refer to a person who uses advanced computer skills to attack computers.
____ are individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.
A computer ____ is a person who has been hired to break into a computer and steal information.