96%(28)27 out of 28 people found this document helpful
This preview shows page 3 - 4 out of 4 pages.
organizations are known asmanaged security serviceproviders63. Inexperienced hackers can download programs calledscript bunnythat automate the job of breaking intocomputers.64.phishingis a form of computer scam that attempts to get users to gain access to a customer's privateinformation through a fake Web site.65.vishingis a scam that attempts to steal an individual's private information by having them call a phonenumber and enter personal data.66.insiderare employees, disgruntled or otherwise, working solo or in concert with outsiders to compromisecorporate systems..
67.spywareis software installed on a personal computer to intercept or take partial control over a user'sinteraction with a computer without the knowledge or permission of the user.68. A(n)Trojan horseis a malicious program that disguises itself as a useful application or game andpurposefully does something a user does not expect.69. A(n)antivirus programis software that runs in the background to protect a user's computer from dangerslurking on the Internet and other possible sources of infected files.70.separation of dutiesis the careful division of the tasks and responsibilities associated with a key process sothat they must be performed by more than one person.71. A(n)intrusion detection systemsmonitors system and network resources and traffic and notifies networksecurity personnel when it senses a possible intrusion.72.ergonomicsis the science of designing machines, products, and systems to maximize the safety, comfort,and efficiency of the people who use them.73. A(n)shillis a person paid by a company to lie about how much he or she has earned and how easy the planwas to operate.74. TheChildren’s Online Privacy Protection Act COPPAis directed at Web sites catering to children andrequires Web site owners to obtain parental consent before they collect any personal information from childrenunder 13 years old.75. A party offended by a libel can file what is known as a(n)John Doelawsuit and use the subpoena power itgrants to force the Internet service provider (ISP) to provide whatever information it has about the anonymousposter, including Internet Protocol (IP) address, name, and street address.76. The hazardous activities associated with unfavorable working conditions are collectively referred to asworkstressors.77. The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency ofthe people who use them is calledergonomics.78.software piracyis the act of unauthorized copying, downloading, sharing, selling, or installing of software.79.ethicalissues deal with what is generally considered right or wrong.80.smishingis a scam that attempts to steal an individual's private information by having them respond to atext message.
End of preview. Want to read all 4 pages?
Upload your study docs or become a
Course Hero member to access this document
Federal Bureau of Investigation, USA PATRIOT Act, Federal Bureau, Collar Crime Center