Question

Match the following terms and definitions.
a. cybercrime
b. cyberlaw
c. cyber forensics
d. pretexting
e. password sniffing
f. salami attacks
g. social engineering
h. phishing
i. dumpster diving

___ 1. Usually targeting the accounting department, these attacks are electronic theft of very small amounts numerous times, such as rounding of fractions of a cent from interest calculations
___ 2. A form of social engineering, the attacker fishes for sensitive, private data, such as using an authentic- looking fraudulent Web site
___ 3. Attacks involving manipulating and tricking individuals into divulging confidential information, such as imposter emails
___ 4. Social engineering attacks that involve creating a scenario and using deception for information gathering purposes
___ 5. Rummaging through garbage for discarded documents or digital media
___ 6. Attempts to obtain passwords by reading messages sent on a network
___ 7. Involves collecting, examining, and preventing evidence of cybercrime
___ 8. Crimes connected to information assets and IT
___ 9. Laws and regulations to prevent, investigate, and prosecute cybercrimes



$1.99
Sales0
Views100
Comments0
  • CreatedFebruary 20, 2015
  • Files Included
Post your question
5000