- contract labor, consultants, janitors, and guards
,social engineering - ANSWER attack where perpetrator uses social skills to trick or
manipulate employees for confidential information
Espionage - ANSWER individual attempts to gain illegal access to organizational
information
Information extortion - ANSWER attacker demands money for
- not stealing info
- giving back info
- not to disclose stolen info
sabotage - ANSWER intruder maliciously alters a web page by inserting or substituting
provocative and frequently offending data
theft - ANSWER smaller equipment are easier to steal
larger storage means more information lost
dumpster diving-ANSWER rummaging through trash in search of discarded information
identity theft-ANSWER assuming the identity of another person in order to access
financial information, or to frame a person of a crime
phishing-ANSWER masquerading as a trusted organization in an electronic
communication
,intellectual property-ANSWER property made by an individual or corporation
trade secret-ANSWER secret of a company, not public information
patent-ANSWER protect an invention or process for 20 years
copyright - ANSWER protects ownership of the property for the life of the creator
user action - ANSWER - virus
- worm
- phishing attack
- spear phishing attack
without user action - ANSWER - denial of service
- distrubuted DoS attack
attack by programmers - ANSWER - trojan horse
- back door
- logic bomb
virus - ANSWER attack by a host computer
worm - ANSWER can spread by itself
spear phishing - ANSWER phishing attack on a specific target
Dos - ANSWER Bombard and crash a target computer with bogus requests
, distributed dos attack - ANSWER Using the hacked computers to perform Dos-attack
trojan horse - ANSWER Disguised as an innocent program
back door - ANSWER A secret entrance that allows for unauthorized access to the
program or system bypassing all security
logic bomb - ANSWER Dormant and only activates at a specified date and time
Alien software - ANSWER programs that are installed on a computer without the
knowledge or consent of user.
alien software - ANSWER
adware
spyware
spamware
cookies
adware - ANSWER pop-up advertisements appear across computer screens.
spyware - ANSWER it keeps track of users' personal information sans latter's
knowledge or permission.
spamware - ANSWER A launchpad is created from which spam emails are sent out.
cookies - ANSWER Small files stored in a computer with detailed information regarding
visited websites
scada (supervisor control and data acquisition) - ANSWER systems control chemical,
physical, or transport processes
cyberterrorism - ANSWER attack via the internet to use a target's computer systems to
cause physical, real world harm
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Easton. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.