Unformatted text preview: (or shut down ) by sending so many requests
________ Unauthorized code in an authorized and perperly functioning program
________ Sending an e - mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information.
________ A network of hijacked computers. Hackers that contol the hijacked computers use them in a varities of Internet attacks. 2 10) Below is a list of controls. Match the controls with the definition. (2 points...
View Full Document
- Spring '14
- Accounting, hash function, Limit superior and limit inferior, organizationʹs control environment, COSOʹs internal control