1. Computer Fraud
Answer unauthorized use of computer data for personal gain such as transferring money from another's
account or charging purchases to someone else's account
2. Spyware
Answer software that secretly gathers information about users while they browse the Web
3. Adware
Answer form of spyware that collects information about the user to display advertisements in the Web browser
4. Phishing
Answer sending fraudulent e-mails that seem to come from legitimate sources
-spear phishing = targeted phishing
5. Pharming
, Answer trick users to visit fraudulent web sites and provide private information
-real web sites can be hijacked
6. Keystroke Loggers
Answer -monitor and record keystrokes
-can be software or hardware devices sometimes used by companies to track employees' use of e-mail and the Internet
-can be used for malicious purposes
7. Sniffing
Answer capturing and recording network traflc often used by hackers to intercept information
8. Spoofing
Answer attempt to gain access to a network by posing as an authorized user to find sensitive information
9. Ransomware
Answer stealing data and demand money for return
,or encrypt data and demand money for key
10. Why is security critical for any organization?
Answer (especially in recent years) with hackers becoming more numerous and adept at stealing and
altering private information
11. Script Kiddies
Answer inexperienced hackers who use tools that others have developed
12. Black Hats
Answer specialized hackers, for profit, fun, political causes, social causes; modify/destroy data
13. White Hats
Answer aka "Ethical Hackers", pentetration testers
14. What kind of tools do hackers use to break into computers and networks?
Answer -
, -Snitters, password crackers, and rootkits
-Journals Phrack and 2600
The Hacker Quarterly
-dark web - untraceable web within the web; easy to hide illegal activity
15. Comprehensive Security System
Answer Protects an organization's resources (information and computer and network equipment, e-mails,
invoices transferred via electronic data interchange (EDI), new product designs, marketing campaigns, and financial
statements, etc.)
16. Security (CIA)
Answer -confidentiality
-integrity
-availability
17. Confidentiality