INSY 3330 Exam 2 Questions & Answers 2024/2025
Worm - ANSWERSmalware that is designed to spread from computer to computer
Trojan horse - ANSWERSappears to be benign, but then does something other than expected; a way for viruses or malicious code to be introduced to a computer system
Phi...
Worm - ANSWERSmalware that is designed to spread from computer to computer
Trojan horse - ANSWERSappears to be benign, but then does something other than expected; a way for
viruses or malicious code to be introduced to a computer system
Phishing attack - ANSWERSonline attempt by a third party to obtain confidential information for financial
gain
Spoofing - ANSWERSinvolves attempting to hide a true identity by using someone else's email or IP
address
TLS (Transport Layer Security) - ANSWERSprovides data encryption, server authentication, optional client
authentication, and message integrity
Digital cash - ANSWERSan alternative payment system in which unique, authenticated tokens represent
cash value
Cyber crime - ANSWERScriminal activity that takes place over the Internet
Botnet - ANSWERSa collection of captured bot computers; respond to commands sent by an external
attacker
Spyware - ANSWERSa program used to obtain information such as a user's keystrokes, email, IM's, and so
on
Symmetric key encryption - ANSWERSboth the sender and receiver use the same key to encrypt and
decrypt the message
, Public key encryption - ANSWERStwo mathematically related digital keys are used (public + private keys);
the private key is kept secret by the owner, and the public key is widely disseminated
- the same key cannot be used to decrypt and unencrypt a given message
Firewall - ANSWERSrefers to either hardware or software that filters communication packets and
prevents some packets from entering the network based on a security policy
Proxy server - ANSWERSsoftware server that handles all communications originating from or being sent
to the Internet; acts as a spokesperson or bodyguard for an organization
Intrusion detection - ANSWERSexamines network traffic, watching to see if it matches certain patterns or
preconfigured rules indicative of an attack
Access control - ANSWERSdetermine who can gain legitimate access to a network
6 Dimensions of E-Commerce Security - ANSWERSintegrity, nonrepudiation, authenticity, confidentiality,
privacy, and availability
Integrity - ANSWERSthe ability to ensure that information being displayed on a Web site or transmitted
over the Internet has not been altered in any by an unauthorized party
Nonrepudiation - ANSWERSthe ability to ensure that e-commerce participants do not deny their online
actions
Authenticity - ANSWERSthe ability to identify the identity of a person or entity with whom you are
dealing on the Internet
Confidentiality - ANSWERSthe ability to ensure that messages and data are available only to those who
are authorized to use them
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Bensuda. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £6.53. You're not tied to anything after your purchase.