Podcast
Questions and Answers
What are the two categories into which computer crime can be separated?
What are the two categories into which computer crime can be separated?
Which of the following is NOT an overlapping type of computer security risk?
Which of the following is NOT an overlapping type of computer security risk?
What is the first and perhaps the easier rule of computer security mentioned in the text?
What is the first and perhaps the easier rule of computer security mentioned in the text?
What type of computer security risk involves hackers exploiting holes in operating systems of local and remote systems?
What type of computer security risk involves hackers exploiting holes in operating systems of local and remote systems?
Signup and view all the answers
What type of malicious software can start working on a computer once it has been used?
What type of malicious software can start working on a computer once it has been used?
Signup and view all the answers
What is the term for computer crimes where the computer is the target?
What is the term for computer crimes where the computer is the target?
Signup and view all the answers
What is the primary focus of physical security in computer security?
What is the primary focus of physical security in computer security?
Signup and view all the answers
What type of computer security risk involves unauthorized remote users exploiting bugs or misconfigurations?
What type of computer security risk involves unauthorized remote users exploiting bugs or misconfigurations?
Signup and view all the answers
What is the term for the type of malicious software that affects a computer system while it is connected to the internet?
What is the term for the type of malicious software that affects a computer system while it is connected to the internet?
Signup and view all the answers
What do hackers exploit when they find ways to access local and remote systems?
What do hackers exploit when they find ways to access local and remote systems?
Signup and view all the answers