Podcast
Questions and Answers
What is the term for when an unauthorized entity gains access to data for which the entity is not authorized?
What is the term for when an unauthorized entity gains access to data for which the entity is not authorized?
- Disruption
- Intrusion
- Unauthorized Disclosure (correct)
- Deception
What is the term for when an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications?
What is the term for when an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications?
- Inference (correct)
- Masquerade
- Corruption
- Exposure
What type of cyber crime involves acquiring sensitive personal information like passwords and credit card details?
What type of cyber crime involves acquiring sensitive personal information like passwords and credit card details?
- Phishing (correct)
- Pharming
- Malware
- Spamming
What is the term for when an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity?
What is the term for when an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity?
What is the term for when an authorized entity receives false data and believes it to be true?
What is the term for when an authorized entity receives false data and believes it to be true?
What is the term for a malicious program designed to replicate itself and transfer from one file folder to another?
What is the term for a malicious program designed to replicate itself and transfer from one file folder to another?
What is the term for when an unauthorized entity gains access to sensitive data by circumventing a system's security protections?
What is the term for when an unauthorized entity gains access to sensitive data by circumventing a system's security protections?
What is the term for a malicious program designed to monitor a user's activities without their knowledge?
What is the term for a malicious program designed to monitor a user's activities without their knowledge?
What is the term for a crime committed or assisted through the use of the Internet?
What is the term for a crime committed or assisted through the use of the Internet?
What is the term for when an unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations?
What is the term for when an unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations?
What is the term for a program designed to send unwanted advertisements, mostly in the form of pop-ups?
What is the term for a program designed to send unwanted advertisements, mostly in the form of pop-ups?
What is the term for a malicious program designed to disguise itself as a useful program, but leaves a computer unprotected and allows hackers to access sensitive information?
What is the term for a malicious program designed to disguise itself as a useful program, but leaves a computer unprotected and allows hackers to access sensitive information?