INSY 3330 Exam 2
Study online at https://quizlet.com/_hq9e23
1. Worm malware that is designed to spread from computer to computer
2. Trojan horse appears to be benign, but then does something other than expected; a way for
viruses or malicious code to be introduced to a computer system
3. Phishing attack online attempt by a third party to obtain confidential information for financial gain
4. Spoofing involves attempting to hide a true identity by using someone else's email or IP
address
5. TLS (Transport provides data encryption, server authentication, optional client authentication, and
Layer Security) message integrity
6. Digital cash an alternative payment system in which unique, authenticated tokens represent
cash value
7. Cyber crime criminal activity that takes place over the Internet
8. Botnet a collection of captured bot computers; respond to commands sent by an external
attacker
9. Spyware a program used to obtain information such as a user's keystrokes, email, IM's, and
so on
10. Symmetric key both the sender and receiver use the same key to encrypt and decrypt the message
encryption
11. Public key en- two mathematically related digital keys are used (public + private keys); the private
cryption key is kept secret by the owner, and the public key is widely disseminated
- the same key cannot be used to decrypt and unencrypt a given message
12. Firewall refers to either hardware or software that filters communication packets and
prevents some packets from entering the network based on a security policy
13. Proxy server
1/5
, INSY 3330 Exam 2
Study online at https://quizlet.com/_hq9e23
software server that handles all communications originating from or being sent to
the Internet; acts as a spokesperson or bodyguard for an organization
14. Intrusion detec- examines network traffic, watching to see if it matches certain patterns or precon-
tion figured rules indicative of an attack
15. Access control determine who can gain legitimate access to a network
16. 6 Dimensions of integrity, nonrepudiation, authenticity, confidentiality, privacy, and availability
E-Commerce Se-
curity
17. Integrity the ability to ensure that information being displayed on a Web site or transmitted
over the Internet has not been altered in any by an unauthorized party
18. Nonrepudiation the ability to ensure that e-commerce participants do not deny their online actions
19. Authenticity the ability to identify the identity of a person or entity with whom you are dealing
on the Internet
20. Confidentiality the ability to ensure that messages and data are available only to those who are
authorized to use them
21. Privacy the ability to control the use of information a customer provides to an e-commerce
merchant
22. Availability the ability to ensure that an e-commerce site continues to function as intended
23. Transaction log records user activity at a Web site
24. Cookie small text file that stores data that allows a Web site to store data on a user's
computer and later retrieve it; tracks users as they travel across the Web
25. Digital divide inequality in access to and usage of the Internet by different demographic groups
2/5
Study online at https://quizlet.com/_hq9e23
1. Worm malware that is designed to spread from computer to computer
2. Trojan horse appears to be benign, but then does something other than expected; a way for
viruses or malicious code to be introduced to a computer system
3. Phishing attack online attempt by a third party to obtain confidential information for financial gain
4. Spoofing involves attempting to hide a true identity by using someone else's email or IP
address
5. TLS (Transport provides data encryption, server authentication, optional client authentication, and
Layer Security) message integrity
6. Digital cash an alternative payment system in which unique, authenticated tokens represent
cash value
7. Cyber crime criminal activity that takes place over the Internet
8. Botnet a collection of captured bot computers; respond to commands sent by an external
attacker
9. Spyware a program used to obtain information such as a user's keystrokes, email, IM's, and
so on
10. Symmetric key both the sender and receiver use the same key to encrypt and decrypt the message
encryption
11. Public key en- two mathematically related digital keys are used (public + private keys); the private
cryption key is kept secret by the owner, and the public key is widely disseminated
- the same key cannot be used to decrypt and unencrypt a given message
12. Firewall refers to either hardware or software that filters communication packets and
prevents some packets from entering the network based on a security policy
13. Proxy server
1/5
, INSY 3330 Exam 2
Study online at https://quizlet.com/_hq9e23
software server that handles all communications originating from or being sent to
the Internet; acts as a spokesperson or bodyguard for an organization
14. Intrusion detec- examines network traffic, watching to see if it matches certain patterns or precon-
tion figured rules indicative of an attack
15. Access control determine who can gain legitimate access to a network
16. 6 Dimensions of integrity, nonrepudiation, authenticity, confidentiality, privacy, and availability
E-Commerce Se-
curity
17. Integrity the ability to ensure that information being displayed on a Web site or transmitted
over the Internet has not been altered in any by an unauthorized party
18. Nonrepudiation the ability to ensure that e-commerce participants do not deny their online actions
19. Authenticity the ability to identify the identity of a person or entity with whom you are dealing
on the Internet
20. Confidentiality the ability to ensure that messages and data are available only to those who are
authorized to use them
21. Privacy the ability to control the use of information a customer provides to an e-commerce
merchant
22. Availability the ability to ensure that an e-commerce site continues to function as intended
23. Transaction log records user activity at a Web site
24. Cookie small text file that stores data that allows a Web site to store data on a user's
computer and later retrieve it; tracks users as they travel across the Web
25. Digital divide inequality in access to and usage of the Internet by different demographic groups
2/5