Chapter3_Internet Crime
Across
- 2. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- 4. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- 5. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
- 10. Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
- 11. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- 12. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- 13. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- 15. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- 18. Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- 20. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- 21. Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- 22. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- 23. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
Down
- 1. They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
- 3. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- 6. In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- 7. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes
- 8. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- 9. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
- 14. Type of attacker that Promote political ideology.
- 16. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
- 17. ______is a program in which malicious code is hidden inside a seemingly harmless program.
- 19. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.