Front | Back |
A(n) ______ is an object, person, or other entity that represents an ongoing danger to an asset. | |
Duplication of software-based intellectual property is more commonly known as software ______. | |
A computer virus consists of segments of code that perform ______ actions. | |
A(n) ________ is a malicious program that replicates itself constantly, without requiring another program environment. | |
A virus or worm can have a payload that installs a(n) ___ door or trap door component in a system, which allows the attacker to access the system at will with special privileges. | |
A momentary low voltage is called a(n) ____. | |
Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive _________. | |
When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial _______. | |
The expert hacker sometimes is called _____ hacker. | |
Script ______ are hackers of limited skill who use expertly written software to attack a system. | |
A(n) _______ hacks the public telephone network to make free calls or disrupt services. | |
ESD means electrostatic _____. | |
A(n) _____ is an act that takes advantage of a vulnerability to compromise a controlled system. | |
A(n) _______ is an identified weakness in a controlled system, where controls are not present or are no longer effective.Feedback | |
Attempting to reverse-calculate a password is called _______. |