ABadware program that displays an online advertisement in banner or pop-up window on webpages backdoor program or set of instructions in program that allows users to bypass security controls when accessing program botnet group of compromised computers or devices connected to network that are used to attack other networks CAPTCHA program that displays an image containing series of distorted characters for user to enter to verify that user input is from human cracker person who accesses computer or network illegally with the intent of destroying data crimeware software used by cybercriminals cybercrime 0nline or Internet-based illegal acts such as distributing malicious software or committing identity theft DoS attack an assault whose purpose is to disrupt computer access to an Internet service such as the web or email DDoS attack type of DoS attack in which zombie army is used to attack computers or computer networks email spoofing spoofing that occurs when the sender's address or other components of an email header are altered so that it appears that the email message originated from different sender face recognition system biometric device that captures live face image and compares it with stored image to determine if the person is legitimate user firewall hardware and/or software that protects network's resources from intrusion by users on another network hacker any person who accesses computer or network illegally malware programs that act without user's knowledge and deliberately alter the operations of computers and mobile devices. Also called malicious software password private combination of characters associated with the user name that allows access to certain computer payload destructive event or prank virus was created to deliver phishing scam that tries to obtain financial or confidential information from Internet users rootkit program that hides in computer or mobile device and allows someone from remote location to take full control of the computer or device script kiddie cybercriminal who has the same intent as cracker but does not have the technical skills and knowledge social engineering scam in which perpetrators gain unauthorized access to or obtain confidential information by taking advantage of the trusting human nature of some victims and the naivety of others spoofing technique intruders use to make their network or Internet transmission appear legitimate to victim computer or network spyware program placed on computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online Trojan horse destructive program that hides within or looks like legitimate program clickbait scam in which an object that can be clicked on website IP spoofing spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source iris recognition system biometric device that uses iris recognition technology to read patterns in the iris of the eye two-step verification computer or mobile device uses two separate methods virus potentially damaging computer program that affects worm malware that resides in active memory and replicates itself over network to infect machines zombie compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider catphishing pretending to be someone else online by using false identities, particularly to pursue deceptive online romances, to gain money or to learn personal details spear phishing email-spoofing attack that sends messages from known or trusted sender to specific organization or individual web filtering software program like LightSpeed that restricts access to certain online materials/websites cracker name given to hackers who break into computers for criminal gain smishing phishing attack where mobile phone users receive text messages containing Web site hyperlink
____18.____ is a server outside a company’s network that controls which communications pass into the company’snetwork.a.A firewallc.A proxy serverb.Intrusion detection softwared.An audit trail
____19.Which of the following is not true of intrusion detection software?
Get answer to your question and much more
____20.Many systems implement access controls using a two-phase process called ____.
Get answer to your question and much more
____21.If a password used on a site like the one shown in the accompanying figure is 4 characters long, the averagetime it would take a computer to discover the password is ____.
Get answer to your question and much more
____22.As shown in the accompanying figure, many Web sites require a user to enter a user ____, which is a uniquecombination of characters, such as letters of the alphabet or numbers, that identifies one specific user.a.termc.nameb.linkd.key
____23.As shown in the accompanying figure, many Web sites require a user to enter a[n] ____, which is a privatecombination of characters associated with a user name that allows access to certain computer resources.
Get answer to your question and much more
____24.Which of the following is an example of a possessed object?
Get answer to your question and much more
What is a technique intruders use to make their network or Internet transmission appear legitimate?
Is someone who uses the Internet or network to destroy or damage computers for political reasons?
Glossary | |
cybercrime | Online or Internet-based illegal acts. |
cyberextortionist | Someone who uses e-mail as a vehicle for extortion. |
cyberterrorist | Someone who uses the Internet or network to destroy or damage computers for political reasons. |
decrypt | Process of deciphering encrypted data into a readable form. |