Unformatted text preview: (or shut down ) by sending so many requests
________ Unauthorized code in an authorized and perperly functioning program
________ Sending an e - mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information.
________ A network of hijacked computers. Hackers that contol the hijacked computers use them in a varities of Internet attacks. 2 10) Below is a list of controls. Match the controls with the definition. (2 points...
View Full Document
This document was uploaded on 03/13/2014.
- Spring '14