Information Security Test
Enter the letter for the matching Definition
| A. A model of informed consent that permits a company to collect personal information until the customer specifically requests that the data not be collected.B. Controls that restrict unauthorized individuals from gaining access to a company's computer facilitiesC. type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installedD. software designed to restrict or control the content a reader is authorised to access, especially when utilised to restrict material delivered over the Internet via the Web, e-mail, or other meansE. An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mailF. (also called asymmetric encryption) A type of encryption that uses two different keys, a public key and a private key.G. Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication.H. any network within your organizationI. A process that determines the identity of the person requiring access.J. A private combination of characters that only the user should know.K. Software packages that attempt to identify and eliminate viruses, worms, and other malicious software.L. 1. The right of privacy is not absolute. Privacy must be balanced against the needs of society.
2. The public's right to know supersedes the individual's right of privacy.M. a sequence of words or other text used to control access to a computer system, program or dataN. A denial-of-service attack that sends a flood of data packets from many compromised computers simultaneously.O. A computer that has been compromised by, and under the control of, a hackerP. an application which controls network traffic to and from a computer, permitting or denying communications based on a security policyQ. an extra layer of security that is known as "multi factor authentication" that requires not only a password and username but also something that only, and only, that user has on them, i.e. a piece of information only they should know or have immediately tR. Malicious software that can attach itself to (or “infect”) other computer programs without the owner of the program being aware of the infection.S. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.T. Tracking people's activities with the aid of computers |
Type the Term that corresponds to the displayed Definition.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
willjhg