Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Information Security Matching
Phishing
An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail
Physical controls
Controls that restrict unauthorized individuals from gaining access to a company's computer facilities
URL filtering
software to block connections to inappropriate Web sites
Browser history
refers to the list of web pages a user has visited recently—and associated data such as page title and time of visit—
Anti-malware
Software packages that attempt to identify and eliminate viruses, worms, and other malicious software.
Public right to know
1. The right of privacy is not absolute. Privacy must be balanced against the needs of society. 2. The public's right to know supersedes the individual's right of privacy.
Distributed Denial of service
A denial-of-service attack that sends a flood of data packets from many compromised computers simultaneously.
Access controls
Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
Digital certificate
An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
Zombies (bots)
A computer that has been compromised by, and under the control of, a hacker
0:00

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: willjhg