As frustrating as viruses and worms are, perhaps more time and money is spent on resolving ____.
Blog
Acts of ____ can lead to unauthorized real or virtual action…
Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.
A(n) ____ is an attack in which a coordinated stream of requ…
A(n) ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
Which of the following is an example of a Trojan horse progr…
Which of the following is an example of a Trojan horse program?
Compared to Web site defacement, vandalism from within a net…
Compared to Web site defacement, vandalism from within a network is less malicious in intent and more public.
An act of theft performed by a hacker falls into the categor…
An act of theft performed by a hacker falls into the category of deliberate acts of theft, but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of “human error”.
When electronic information is stolen, the crime is readily…
When electronic information is stolen, the crime is readily apparent.
A mail bomb is a form of DoS.
A mail bomb is a form of DoS.
A worm can deposit copies of itself onto all Web servers tha…
A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.
In a(n) ____ attack, the attacker sends a large number of co…
In a(n) ____ attack, the attacker sends a large number of connection or information requests to a target.