Chapter 121) A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
C2) Which of the following is considered a threat caused by human error?
A3) Which of the following is considered a computer crime?A) deletion of records by an employee who is unaware of operating proceduresB) poorly written programs resulting in data lossesC) loss of data as a result of floodingD) hacking of information systemsAnswer:
D4) ________ occurs when someone deceives by pretending to be someone else.
D5) When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
A6) A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.