p1

50 terms by Juntistik 

Ready to study?
Start with Flashcards

Create a new folder

Advertisement Upgrade to remove ads

Computer Security

_____ is the protection of computer assets from unauthorized accessed, use, alteration, or destruction.

Threat

Any act or object that poses a danger to computer assets is known as a _____.

Logical

The protection of assets using nonphysical means is called _____ security.

Eavesdropper

A(n) _____ is a person or device that is able to listen in on and copy Internet transmissions.

Hacker

Originally, the term _____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.

Secrecy

_____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.

Integrity

_____ refers to preventing unauthorized data modification.

Necessity

_____ Refers to preventing data delays or denials.

Web Bug

The purpose of a(n) _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.

Active Content

_____ refers to programs that are embedded transparently in Web pages and that cause action to occur.

Applet

A(n) _____ is a small application program.

Trojan Horse

A(n) _____ is a program hidden inside another program or Web page that masks its true purpose.

Sun Microsystems

Java is a programming language developed by _____.

Active X Control

A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.

Windows

Active X controls run only on computers with _____ operating systems.

Virus

A(n) _____ is software that attaches itself to another program and can cause damage when the host program is activated.

Steganography

The term _____ describes the process of hiding information within another piece of information.

Privacy

_____ is the protection of individual rights to nondisclosure.

Sniffer Programs

Software applications called _____ provide the means to record information that passes through a computer or router that is handling Internet traffic.

Backdoor

A(n) _____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting, data, or stealing data.

Cybervandalism

_____ is the electronic defacing of an existing Web site's page.

Spoofing

_____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.

Symmetric

_____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.

Authenticity

A Web server can compromise _____ when it allows automatic directory listings.

A Buffer

_____ is an area of memory set aside to hold data read from a file or database.

Scrip

_____ is/are digital cash mired by a company instead of by a government.

For-Profit

What payment method dominates online transactions today?

Not-For-Profit Fundraising

Most current scrip offerings, such as eScrip, focus on the _____ market.

Charge Card

A _____, offered by companies such as American Express, carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.

Closed Loop

In a(n) _____ system, the card issuer pays the merchants that accept the card directly and does not use an intermediary, such as a bank or clearinghouse system.

Open Loop

Whenever a third party processes a transaction, the system is called a(n) _____ system.

Merchant

A(n) _____ bank is a bank that does business with sellers that want to accept payment cards.

Chargeback

When a cardholder successfully contests a charge, the merchant bank must retrieve the money it placed in the merchant account in a process called a(n) _____.

Automated Clearing House

ACH is short for _____.

Micropayments

Internet payments for items costing from a few cents to approximately a dollar are called _____.

Small Payment

The term _____ refers to all payments of less than $10.

Mobile

Some companies have begun to offer small payment and micropayment services through _____ telephone carriers.

Double Spending

_____ is spending a particular piece of electronic cash twice by submitting the same electronic currency to two different vendors.

Anonymous

_____ electronic cash is electronic cash that cannot be traced back to the person who spent it.

Serial Number

One way to be able to trace electronic cash is to attach a _____ to each electronic cash transaction.

Serial Numbers

Creating truly anonymous electronic cash requires a bank to issue electronic cash with embedded _____ such that the bank can digitally sign the electronic cash while removing any association of the cash with a particular customer.

Float

PayPal earns a profit on the _____, which is money that is deposited in Paypal accounts and not used immediately.

Peer-To-Peer

The free payment clearing service that PayPal provides to individuals is called a _____ payment system.

Client-Side

A(n) _____ electronic wallet stores a consumer's information on his/her own computer.

Client-Side

A disadvantage of _____ wallets is that they are not portable.

Smart Card

A _____ is a stored-value card that is a plastic card with an embedded microchip that can store information.

Paper Checks

The largest dollar volume of payments today are made using _____.

Phishing

_____ is a technique for committing fraud against the customers of online businesses.

Identity Theft

_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.

True

To request a secure connection in an ASP.NET application, you must use an absolute URL. True or False?

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set