Top-Rated Free Essay
Preview

Ais Ch. 11

Powerful Essays
910 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ais Ch. 11
11.11
1. Usually targeting the accounting department, these attacks are electronic theft of very small amounts numerous times, such as rounding of fractions of a cent from interest calculations F. salami attacks
2. A form of social engineering, the attacker fishes for sensitive, private data, such as using an authentic-looking fraudulent Web site H. phishing
3. Attacks involving manipulating and tricking individuals into divulging confidential information, such as imposter emails G. social engineering
4. Social engineering attacks that involve creating a scenario and using deception for information gathering purposes D. pretexting
5. Rummaging through garbage for discarded documents or digital media I. dumpster diving
6. Attempts to obtain passwords by reading messages sent on a network E. password sniffing
7. Involves collecting, examining, and preventing evidence of cybercrime C. cyber forensics
8. Crimes connected to information assets and IT A. cybercrime
9. Laws and regulations to prevent, investigate, and prosecute cybercrimes B. cyberlaw

11.12
1. Malicious software that executes when a specified event occurs, such a logging into a bank account D. logic bombs
2. Malware sent by email that can be a virus, Trojan horse, worms, logic bombs, or bots F. spam
3. Malware disguised as a legitimate program B. Trojan horse
4. Tiny pieces of programming code that install themselves on an infected computer called a Zombie and transmit data back to the hackers’ computer without awareness of the Zombie computer user E. bots
5. Relatively small programs that infect other application software by attaching to it and disturbing application functioning A. viruses
6. Similar to viruses except they do not need a host application to function or reproduce C. worms

11.17
1. A small sequence of programming code inserted into a program to fix an error or add a new feature F. patch
2. Network hardware and software C. network architecture
3. Application software executing that runs a group of transactions at a later time H. batch
4. Application software execution that processes transactions at the current time G. real-time
5. Computer hardware components and computer software B. computer architecture
6. Computer programs for a specific application, such as accounting E. application software
7. A blueprint for computers, networks, and databases A. IT architecture
8. Computer programs used for managing computer hardware D. system software

11.18
1. A network that covers a large geographic region, such as several states C. wide area network (WAN)
2. A device connecting an enterprise intranet to the Internet K. gateways
3. Special purpose computers that monitor network G. routing devices
4. A software program that provides routing services to messages transmitted over the Internet N. internet protocol
5. A network that allows computers to request data and other services from other specific computers on the network Q. client/server network
6. A group of the same type of LANs connected to each other by bridges I. LAN cluster
7. A network covering a city B. metropolitan area network (MAN)
8. A software program commonly used to connect computers on a LAN M. ethernet protocol
9. A computer that serves other computers with data and applications, such as an accounting database E. server computers
10. A software program that allows the enterprise network to connect to the network of vendors through proprietary lines P. electronic data interchange (EDI)
11. Utility devices connected to a network for shared use, such as a printer F. peripherals
12. A personal computer or laptop connected to a network D. workstation computers
13. Physical media connecting computers L. network wiring (transmission media)
14. A software program that provides transportation services to messages sent over the Internet O. transport control protocol (TCP)
15. Computer connected in a relatively small area, such as your college campus A. local area network (LAN)
16. A network that allows an organization to share data with suppliers R. value-added network
17. An electronic device that connects networks of different types J. routers
18. A device that connects two LANs of the same type H. bridges

11.19
1. A provider of online applications, such as accounting applications, for a fee L. application service providers (ASP)
2. A proactive approach to enterprise security that involves developing an overall plan B. enterprise security architecture
3. A network software program that connects one computer to another computer H. point-to-point protocol (PPP)
4. An Internet protocol that allowed the creation of the World Wide Web M. hypertext transfer protocol (HTTP)
5. An enterprise-wide network D. intranet
6. A software program permitting an employee to use the enterprise network through a secure channel J. point-to-point tunneling protocol (PPTP)
7. A point on the network that offers access to the network, such as an accountant’s computer D. intranet
8. A provider of access to the Internet for a fee K. internet service provider (ISP)
9. Online sales transactions O. e-commerce
10. A network that provides a secure channel to access the enterprise network
11. Electrical transmission of data through analog or digital networks C. telecommunications
12. A wide network used by external customers and suppliers E. extranet
13. Accessing a computer from a remote location G. remote access
14. Tossing in security patches, hoping to cover vulnerabilities A. stovepipe
15. Located on a proxy server and used to intercept an inspect all incoming messages prior to delivering them to the intended recipient P. proxy firewall
16. A Web site address N. uniform resource locator (URL)

You May Also Find These Documents Helpful

  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    4. It is a program in which malicious or harmful code is disguised inside some apparently harmless programming or data.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A piece of unwanted computer software or code introduced into another program, attached to a document or exists on its own, for malicious purposes.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    1) Security attacks – action that compromises the security of information owned by an organization.…

    • 788 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Chapter 9 Final Exam Paper

    • 4652 Words
    • 19 Pages

    a) organization mission – organization strategic plan – IS strategic plan – new IT architecture…

    • 4652 Words
    • 19 Pages
    Good Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    Awad, Neveen Farag, and Kristina Fitzgerald. "The Deceptive Behaviors That OFFEND US MOST About Spyware." Communications Of The ACM 48.8 (2005): 55-60. Business Source Elite. Web. 15 June 2013.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    True or False: A computer worm consists of segments of code that perform malicious actions.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A general term for software that is designed to destroy or disrupt data or do other unwanted actions in a computer system.…

    • 1399 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    Provide three specific examples of how the Internet has aided criminal activity. One of the examples could be considered as identity theft. Identity theft is the use of one person 's personal information by another to commit fraud or other crimes. The most common forms of identity theft occur when someone obtains another person 's social security number, driver 's license number, date of birth, and the like and uses it to open a fraudulent bank, credit card, cellular telephone, or other account, or to obtain false…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Identity Theft Q&A

    • 402 Words
    • 2 Pages

    If the consumer spends their money according to their financial plan it would be successful.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Hadnagy, C. (2010). Social Engineering: The Art of Human Hacking. Indianapolis, Indiana: John Wiley and Sons.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    A(n) ____ attack is a hacker using a personal computer to break into a system.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Business Memo

    • 675 Words
    • 3 Pages

    With the advancement of technology in the work place, the opportunity for malicious users to infiltrate and corrupt your business increases. Knowing what types of methods these individuals are using will help you in developing preventative measures. Keeping employees informed of the ways to recognize and respond to social engineering techniques are important to an organizations overall information security program. The two types of social engineering threats business face are local and remote social engineering.…

    • 675 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Credit Card Fraud

    • 1919 Words
    • 8 Pages

    The fraud begins mostly in two ways, either by the theft of the corporeal card or by the negotiation of data related with the account including all the information. The compromise can occur by many common routes and one of the ways which’s typically used is warning the card holder, until the account is ultimately used for fraud. Here’s an example where a store clerk is copying sales receipts so he can use them later. Using credit card on internet…

    • 1919 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    4.1.2.2. Transmitting worms, Trojan horses, trap door code, or…

    • 2122 Words
    • 9 Pages
    Powerful Essays