Jimmy Clark is sitting home one night and is very bored. He gets on his
computer and starts to surf the net. He comes to a military site. He thinks
he might be able to get around the security of the site and into the
military computer system. He spends the next two hours trying to find his
way into their system. Jimmy is ________.
Answer: a hacker
Answer: can be classified as input controls, processing controls, and
The potential for unauthorized access is usually limited to the
communications lines of a network.
Many firms spend heavily on security because it is directly related to sales
Fault-tolerant computers contain redundant hardware, software, and
power supply components.
DoS attacks are used to destroy information and access restricted areas
of a company's information system.
Answer: False Question 7
Popular IM applications for consumers do not use a secure layer for text
messages, so they can be intercepted and read by outsiders during
transmission over the public Internet.
SSL is a protocol used to establish a secure connection between two
________ consists of business processes and software tools for identifying
the valid users of a system and controlling their access to system
Answer: Identity management
________ use scanning software to look for known problems such as bad
passwords, the removal of important files, security attacks in progress,