Podcast
Questions and Answers
What is the term for when an unauthorized entity gains access to data for which the entity is not authorized?
What is the term for when an unauthorized entity gains access to data for which the entity is not authorized?
What is the term for when an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications?
What is the term for when an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications?
What type of cyber crime involves acquiring sensitive personal information like passwords and credit card details?
What type of cyber crime involves acquiring sensitive personal information like passwords and credit card details?
What is the term for when an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity?
What is the term for when an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity?
Signup and view all the answers
What is the term for when an authorized entity receives false data and believes it to be true?
What is the term for when an authorized entity receives false data and believes it to be true?
Signup and view all the answers
What is the term for a malicious program designed to replicate itself and transfer from one file folder to another?
What is the term for a malicious program designed to replicate itself and transfer from one file folder to another?
Signup and view all the answers
What is the term for when an unauthorized entity gains access to sensitive data by circumventing a system's security protections?
What is the term for when an unauthorized entity gains access to sensitive data by circumventing a system's security protections?
Signup and view all the answers
What is the term for a malicious program designed to monitor a user's activities without their knowledge?
What is the term for a malicious program designed to monitor a user's activities without their knowledge?
Signup and view all the answers
What is the term for a crime committed or assisted through the use of the Internet?
What is the term for a crime committed or assisted through the use of the Internet?
Signup and view all the answers
What is the term for when an unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations?
What is the term for when an unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations?
Signup and view all the answers
What is the term for a program designed to send unwanted advertisements, mostly in the form of pop-ups?
What is the term for a program designed to send unwanted advertisements, mostly in the form of pop-ups?
Signup and view all the answers
What is the term for a malicious program designed to disguise itself as a useful program, but leaves a computer unprotected and allows hackers to access sensitive information?
What is the term for a malicious program designed to disguise itself as a useful program, but leaves a computer unprotected and allows hackers to access sensitive information?
Signup and view all the answers