INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!
0 view 0 purchase
Course
INF4831
Institution
INF4831
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!
security risk
any threat to the data held by a company or individual, including theft, loss or destruction
security precaution
any counter-measure to prevent a computer security threat
malware
any softwar...
inf4831 information security questions and answers
Written for
INF4831
All documents for this subject (31)
Seller
Follow
SUPERGRADES01
Reviews received
Content preview
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS
A+ GRADED. Buy Quality Materials!
security risk
any threat to the data held by a company or individual, including theft, loss or
destruction
security precaution
any counter-measure to prevent a computer security threat
malware
any software or computer based activity that poses a threat
spyware
a program that installs onto a users system without permission, monitors the users work
and sends reports to a hacker
phishing
a fake e-mail requesting confidential information from a user, the hacker who sent it will
misuse the information, perhaps for fraud or identity theft
keylogging
a program or a gadget that installs onto a users system without permission and records
every key press, usually to steal passwords or credit card numbers which are sent to a
hacker
online fraud
any criminal activity on a network where a criminal misleads another person to steal
money or property
identity theft
a hacker can gather enough personal information to impersonate another person and
then misuse the identity to commit a crime
Denial of Service attacks
A hacker (alone or with others) sets up a computer to send a very large number of
messages to a server or website. There are so many messages and they come so fast
that the server is overloaded and stops working for normal users.
Cyber Law
Laws and rules to prevent crime or misuse of computers.
Computer Misuse Act
This law makes it an offence to hack (access a computer system without permission,
even just to look). It is also an offence to make or send a virus or malware.
hacking
Any kind of access to a system without permission.
Data Protection Act
This law protects the rights of Data Subjects about their personal data and forces data
controllers who store it to be responsible.
Copyright, Designs and Patents Act
This law gives automatic rights to people who create things like images, stories,
software or inventions. Other people cannot take or use the created item without the
permission of the maker.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller SUPERGRADES01. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.