12 Questions
What is the term for when an unauthorized entity gains access to data for which the entity is not authorized?
Unauthorized Disclosure
What is the term for when an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications?
Inference
What type of cyber crime involves acquiring sensitive personal information like passwords and credit card details?
Phishing
What is the term for when an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity?
Masquerade
What is the term for when an authorized entity receives false data and believes it to be true?
Deception
What is the term for a malicious program designed to replicate itself and transfer from one file folder to another?
Worm
What is the term for when an unauthorized entity gains access to sensitive data by circumventing a system's security protections?
Intrusion
What is the term for a malicious program designed to monitor a user's activities without their knowledge?
Spyware
What is the term for a crime committed or assisted through the use of the Internet?
Cyber crime
What is the term for when an unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations?
Interception
What is the term for a program designed to send unwanted advertisements, mostly in the form of pop-ups?
Adware
What is the term for a malicious program designed to disguise itself as a useful program, but leaves a computer unprotected and allows hackers to access sensitive information?
Trojan
Test your knowledge of internet security basics, including confidentiality, integrity, availability, threats, and consequences. Learn about unauthorized disclosure, exposure, and interception of sensitive data.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free