INSY 3330 EXAM 2 Review Quizzes
Worm - malware that is designed to spread from computer to computer Trojan Horse - appears to be benign, but then does something other than expected. Often a way for malicious code to be introduced. Phishing Attack - typically do not malicious code but instead rely on straightforward misrepresentation and fraud. (Deceptive, online way to get confidential info) Spoofing - attempting to hide a true identity by using someone else's email or IP address. TLS - protocol for a secure channel Digital Cash - alternative payment system in which unique authenticated tokens represent cash value. Cybercrime - becoming more of a problem E-commerce Security (6 Dimensions) - integrity, nonrepudiation, authenticity, confidentiality, privacy, and availability. E-commerce Vulnerability - client, the server, and the communications pipeline. Botnet - collection of captured bot computers Spyware - program used to obtain info such as a user's keystrokes, email, instant messages, and so on. Symmetric Key Encryption - both the sender and the receiver use the same key to encrypt and decrypt the message.
Voorbeeld van de inhoud
Geschreven voor
- Instelling
- INSY 3330
- Vak
- INSY 3330
Documentinformatie
- Geüpload op
- 1 augustus 2024
- Aantal pagina's
- 5
- Geschreven in
- 2024/2025
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
insy 3330 exam 2 review quizzes
Ook beschikbaar in voordeelbundel