Chapter 11 Study Guide

Chapter 11 Study Guide - Chapter 11 Study Guide T - Not all...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 11 Study Guide T - Not all breaches to security are planned (some are accidental) T - The term, cyberwarfare, describes an attack whose goal ranges from disabling a government’s computer network to crippling a country False - Many methods exist to guarantee completely a computer or network is safe from computer viruses and other malware T - Cybercriminals install malicious bots on unprotected computers to create a zombie army False - A honeypot is a computer that is isolated and, therefore, immune to attack T - Biometric payment involves a customer’s fingerprint being read by a fingerprint reader that is linked to a payment method such as a checking account or credit card T - Some businesses use a real time location system (RTLS) to track and identify the location of high-risk or high-value items T - A program called a keygen, short for key generator, creates software registration numbers and sometimes activation codes False - With public (private) key encryption, both the originator and recipient use the same secret key to encrypt and decrypt the data False - A digital signature (hash signature) is a mathematical formula that generates a code from
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This document was uploaded on 10/29/2011 for the course CIS 101 at Harper.

Page1 / 3

Chapter 11 Study Guide - Chapter 11 Study Guide T - Not all...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online