_____ is the protection of computer assets from unauthorized accessed, use, alteration, or destruction.
A(n) _____ is a person or device that is able to listen in on and copy Internet transmissions.
Originally, the term _____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.
_____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.
The purpose of a(n) _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.
_____ refers to programs that are embedded transparently in Web pages and that cause action to occur.
A(n) _____ is a program hidden inside another program or Web page that masks its true purpose.
Active X Control
A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
A(n) _____ is software that attaches itself to another program and can cause damage when the host program is activated.
The term _____ describes the process of hiding information within another piece of information.
Software applications called _____ provide the means to record information that passes through a computer or router that is handling Internet traffic.
A(n) _____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting, data, or stealing data.
_____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
_____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.
A _____, offered by companies such as American Express, carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.
In a(n) _____ system, the card issuer pays the merchants that accept the card directly and does not use an intermediary, such as a bank or clearinghouse system.
A(n) _____ bank is a bank that does business with sellers that want to accept payment cards.
When a cardholder successfully contests a charge, the merchant bank must retrieve the money it placed in the merchant account in a process called a(n) _____.
Internet payments for items costing from a few cents to approximately a dollar are called _____.
Some companies have begun to offer small payment and micropayment services through _____ telephone carriers.
_____ is spending a particular piece of electronic cash twice by submitting the same electronic currency to two different vendors.
_____ electronic cash is electronic cash that cannot be traced back to the person who spent it.
One way to be able to trace electronic cash is to attach a _____ to each electronic cash transaction.
Creating truly anonymous electronic cash requires a bank to issue electronic cash with embedded _____ such that the bank can digitally sign the electronic cash while removing any association of the cash with a particular customer.
PayPal earns a profit on the _____, which is money that is deposited in Paypal accounts and not used immediately.
The free payment clearing service that PayPal provides to individuals is called a _____ payment system.
A _____ is a stored-value card that is a plastic card with an embedded microchip that can store information.
_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.