How can we help?

You can also find more resources in our Help Center.

50 terms

p1

STUDY
PLAY
Computer Security
_____ is the protection of computer assets from unauthorized accessed, use, alteration, or destruction.
Threat
Any act or object that poses a danger to computer assets is known as a _____.
Logical
The protection of assets using nonphysical means is called _____ security.
Eavesdropper
A(n) _____ is a person or device that is able to listen in on and copy Internet transmissions.
Hacker
Originally, the term _____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.
Secrecy
_____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.
Integrity
_____ refers to preventing unauthorized data modification.
Necessity
_____ Refers to preventing data delays or denials.
Web Bug
The purpose of a(n) _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.
Active Content
_____ refers to programs that are embedded transparently in Web pages and that cause action to occur.
Applet
A(n) _____ is a small application program.
Trojan Horse
A(n) _____ is a program hidden inside another program or Web page that masks its true purpose.
Sun Microsystems
Java is a programming language developed by _____.
Active X Control
A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
Windows
Active X controls run only on computers with _____ operating systems.
Virus
A(n) _____ is software that attaches itself to another program and can cause damage when the host program is activated.
Steganography
The term _____ describes the process of hiding information within another piece of information.
Privacy
_____ is the protection of individual rights to nondisclosure.
Sniffer Programs
Software applications called _____ provide the means to record information that passes through a computer or router that is handling Internet traffic.
Backdoor
A(n) _____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting, data, or stealing data.
Cybervandalism
_____ is the electronic defacing of an existing Web site's page.
Spoofing
_____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
Symmetric
_____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.
Authenticity
A Web server can compromise _____ when it allows automatic directory listings.
A Buffer
_____ is an area of memory set aside to hold data read from a file or database.
Scrip
_____ is/are digital cash mired by a company instead of by a government.
For-Profit
What payment method dominates online transactions today?
Not-For-Profit Fundraising
Most current scrip offerings, such as eScrip, focus on the _____ market.
Charge Card
A _____, offered by companies such as American Express, carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.
Closed Loop
In a(n) _____ system, the card issuer pays the merchants that accept the card directly and does not use an intermediary, such as a bank or clearinghouse system.
Open Loop
Whenever a third party processes a transaction, the system is called a(n) _____ system.
Merchant
A(n) _____ bank is a bank that does business with sellers that want to accept payment cards.
Chargeback
When a cardholder successfully contests a charge, the merchant bank must retrieve the money it placed in the merchant account in a process called a(n) _____.
Automated Clearing House
ACH is short for _____.
Micropayments
Internet payments for items costing from a few cents to approximately a dollar are called _____.
Small Payment
The term _____ refers to all payments of less than $10.
Mobile
Some companies have begun to offer small payment and micropayment services through _____ telephone carriers.
Double Spending
_____ is spending a particular piece of electronic cash twice by submitting the same electronic currency to two different vendors.
Anonymous
_____ electronic cash is electronic cash that cannot be traced back to the person who spent it.
Serial Number
One way to be able to trace electronic cash is to attach a _____ to each electronic cash transaction.
Serial Numbers
Creating truly anonymous electronic cash requires a bank to issue electronic cash with embedded _____ such that the bank can digitally sign the electronic cash while removing any association of the cash with a particular customer.
Float
PayPal earns a profit on the _____, which is money that is deposited in Paypal accounts and not used immediately.
Peer-To-Peer
The free payment clearing service that PayPal provides to individuals is called a _____ payment system.
Client-Side
A(n) _____ electronic wallet stores a consumer's information on his/her own computer.
Client-Side
A disadvantage of _____ wallets is that they are not portable.
Smart Card
A _____ is a stored-value card that is a plastic card with an embedded microchip that can store information.
Paper Checks
The largest dollar volume of payments today are made using _____.
Phishing
_____ is a technique for committing fraud against the customers of online businesses.
Identity Theft
_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.
True
To request a secure connection in an ASP.NET application, you must use an absolute URL. True or False?