Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Information Security Matching
jurisdiction
Any court can assert its authority over an individual or organization if it can establish _____. That is, the court’s right to hear a case if a wrong is committed in its territory or involves its citizenry.
intellectual property
_____ is defined as “the ownership of ideas and control over the tangible or virtual representation of those ideas. _____ can be trade secrets, copyrights, trademarks, and patents.
Economic Espionage Act in 1996
To protect American ingenuity, intellectual property, and competitive advantage, Congress passed the _____. This law attempts to prevent trade secrets from being illegally shared.
phreaker
A _____ hacks the public telephone network to make free calls or disrupt services.
malicious code
A _____ attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information.
controls
Missing, inadequate, or incomplete _____ that are missing, misconfigured, antiquated, or poorly designed make an organization more likely to suffer losses when other threats lead to attacks.
1. dissemination (distribution), 2. review (reading), 3. comprehension (understanding), 4. compliance (agreement), 5. uniform enforcement
For a policy to become enforceable, it must meet the following five criteria:
exposure
In information security, _____exists when a vulnerability known to an attacker is present.
criminal law
_____ addresses activities and conduct harmful to society, and is actively enforced by the state.
timing
A _____ attack explores the contents of a Web browser’s cache and stores a malicious cookie on the client’s system.
0:00

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: kimberjingle
Popular Computers sets