The principal goal of the information security program should be to ______. Answer: ensure that systems and their contents remain the same.
Information security has more to do with _____ than with _____ Answer: management, technology
True or False: Many organizations find that their most valuable asset is their data. Answer: True
True or False: A computer worm consists of segments of code that perform malicious actions. Answer: True
____ are hackers of limited skill who use expertly written software to attack a system Answer: Unskilled Hackers
____ occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it. a.
____ hack systems to conduct terrorist activities via network or Internet pathways. a.
True or False: Cyberterrorism has thus far been largely limited to acts such as the defacement of NATO Web pages during the war in Kosovo. Answer: True
______ is the illegal taking of another’s property, which can be physical, electronic, or intellectual. Answer: Deliberate acts of theft
A(n) attack is an act that exploits a(n) ______.
Answer: Vulnerability in a controlled system
True or False: Warnings of attacks that are not valid are usually called hoaxes. Answer: True
Using a known or previously installed access mechanism is called using a _____. a.
When a program tries using all commonly used passwords, this is known as a(n) ______. Answer: Dictionary attack
True or False: When a program tries to reverse-calculate passwords, this is known as a brute force spoof. Answer: Password crack
Another name for TCP hijacking is...
Please join StudyMode to read the full document