An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail
Physical controls
Controls that restrict unauthorized individuals from gaining access to a company's computer facilities
URL filtering
software to block connections to inappropriate Web sites
Browser history
refers to the list of web pages a user has visited recently—and associated data such as page title and time of visit—
Anti-malware
Software packages that attempt to identify and eliminate viruses, worms, and other malicious software.
Public right to know
1. The right of privacy is not absolute. Privacy must be balanced against the needs of society.
2. The public's right to know supersedes the individual's right of privacy.
Distributed Denial of service
A denial-of-service attack that sends a flood of data packets from many compromised computers simultaneously.
Access controls
Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
Digital certificate
An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
Zombies (bots)
A computer that has been compromised by, and under the control of, a hacker