_____ is the protection of computer assets from unauthorized accessed, use, alteration, or destruction.
Any act or object that poses a danger to computer assets is known as a _____.
The protection of assets using nonphysical means is called _____ security.
A(n) _____ is a person or device that is able to listen in on and copy Internet transmissions.
Originally, the term _____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.
_____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.
_____ refers to preventing unauthorized data modification.
_____ Refers to preventing data delays or denials.
The purpose of a(n) _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.
_____ refers to programs that are embedded transparently in Web pages and that cause action to occur.
A(n) _____ is a small application program.
A(n) _____ is a program hidden inside another program or Web page that masks its true purpose.
Java is a programming language developed by _____.
Active X Control
A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
Active X controls run only on computers with _____ operating systems.
A(n) _____ is software that attaches itself to another program and can cause damage when the host program is activated.
The term _____ describes the process of hiding information within another piece of information.
_____ is the protection of individual rights to nondisclosure.
Software applications called _____ provide the means to record information that passes through a computer or router that is handling Internet traffic.
A(n) _____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting, data, or stealing data.
_____ is the electronic defacing of an existing Web site's page.
_____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
_____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.
A Web server can compromise _____ when it allows automatic directory listings.
_____ is an area of memory set aside to hold data read from a file or database.
_____ is/are digital cash mired by a company instead of by a government.
What payment method dominates online transactions today?
Most current scrip offerings, such as eScrip, focus on the _____ market.
A _____, offered by companies such as American Express, carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.
In a(n) _____ system, the card issuer pays the merchants that accept the card directly and does not use an intermediary, such as a bank or clearinghouse system.
Whenever a third party processes a transaction, the system is called a(n) _____ system.
A(n) _____ bank is a bank that does business with sellers that want to accept payment cards.
When a cardholder successfully contests a charge, the merchant bank must retrieve the money it placed in the merchant account in a process called a(n) _____.
Automated Clearing House
ACH is short for _____.
Internet payments for items costing from a few cents to approximately a dollar are called _____.
The term _____ refers to all payments of less than $10.
Some companies have begun to offer small payment and micropayment services through _____ telephone carriers.
_____ is spending a particular piece of electronic cash twice by submitting the same electronic currency to two different vendors.
_____ electronic cash is electronic cash that cannot be traced back to the person who spent it.
One way to be able to trace electronic cash is to attach a _____ to each electronic cash transaction.
Creating truly anonymous electronic cash requires a bank to issue electronic cash with embedded _____ such that the bank can digitally sign the electronic cash while removing any association of the cash with a particular customer.
PayPal earns a profit on the _____, which is money that is deposited in Paypal accounts and not used immediately.
The free payment clearing service that PayPal provides to individuals is called a _____ payment system.
A(n) _____ electronic wallet stores a consumer's information on his/her own computer.
A disadvantage of _____ wallets is that they are not portable.
A _____ is a stored-value card that is a plastic card with an embedded microchip that can store information.
The largest dollar volume of payments today are made using _____.
_____ is a technique for committing fraud against the customers of online businesses.
_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.
To request a secure connection in an ASP.NET application, you must use an absolute URL. True or False?