Matching
Match the computer crime term with its definition.
Premises:
Intentional defacement of Web sites
Unauthorized alterations to data stored on a computer system
An attempt to disrupt the operations of a network
Launching viruses, worms, and Trojan horses
Unauthorized access to a computer system to gain restricted information
Malware that combines more than one type of malicious program
Unauthorized copying of personal information
A type of program that secretly records keystrokes
A method for stealing user IDs and passwords
Redirecting small, unnoticeable amounts of money from large amounts
Responses:
brute force attack
blended threat
virus distribution
keylogger
denial of service
salami shaving
identity theft
vandalism
data diddling
information theft
Correct Answer:
Premises:
Responses:
Intentional defacement of Web sites
Unauthorized alterations to data stored on a computer system
An attempt to disrupt the operations of a network
Launching viruses, worms, and Trojan horses
Unauthorized access to a computer system to gain restricted information
Malware that combines more than one type of malicious program
Unauthorized copying of personal information
A type of program that secretly records keystrokes
A method for stealing user IDs and passwords
Redirecting small, unnoticeable amounts of money from large amounts
Premises:
Intentional defacement of Web sites
Unauthorized alterations to data stored on a computer system
An attempt to disrupt the operations of a network
Launching viruses, worms, and Trojan horses
Unauthorized access to a computer system to gain restricted information
Malware that combines more than one type of malicious program
Unauthorized copying of personal information
A type of program that secretly records keystrokes
A method for stealing user IDs and passwords
Redirecting small, unnoticeable amounts of money from large amounts
Responses:
Related Questions
Q47: A voltage spike is another term for
Q48: <img src="https://d2lvgg3v3hfg70.cloudfront.net/TBX8740/.jpg" alt=" The device shown
Q49: You have just been hired as an
Q50: Spam filters are not included in email
Q51: <img src="https://d2lvgg3v3hfg70.cloudfront.net/TBX8740/.jpg" alt=" The device shown
Q53: Data security on a system that is
Q54: A keylogger is a program that secretly
Q55: <img src="https://d2lvgg3v3hfg70.cloudfront.net/TBX8740/.jpg" alt=" Item 2 in
Q56: A _ virus infects the system files
Q57: A _ is a message containing information