Questions and Answers
What are the two categories into which computer crime can be separated?
Crimes facilitated by a computer and crimes where the computer is the target
Which of the following is NOT an overlapping type of computer security risk?
Unauthorized access to sensitive data through social engineering
What is the first and perhaps the easier rule of computer security mentioned in the text?
Physical Security
What type of computer security risk involves hackers exploiting holes in operating systems of local and remote systems?
Signup and view all the answers
What type of malicious software can start working on a computer once it has been used?
Signup and view all the answers
What is the term for computer crimes where the computer is the target?
Signup and view all the answers
What is the primary focus of physical security in computer security?
Signup and view all the answers
What type of computer security risk involves unauthorized remote users exploiting bugs or misconfigurations?
Signup and view all the answers
What is the term for the type of malicious software that affects a computer system while it is connected to the internet?
Signup and view all the answers
What do hackers exploit when they find ways to access local and remote systems?
Signup and view all the answers
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.