(a) Technical attack
- An attack perpetrated using software and systems knowledge or expertise
(b) Nontechnical attack
- An attack in which a perpetrator uses chicanery or other form of persuasion to trick people into revealing sensitive information or performing actions that compromise the security of a network
(c) Common vulnerabilities and exposures (CVEs)
- Publicly known computer security risks or problems; these are collected, enumerated, and shared by a board of security-related organizations (cve.mitre.org)
(d) Denial-of-service (DoS) attack
- An attack on a Web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources
(e) Distributed denial of service (DDoS) attack
- A denial-of-service attack in which the attacker gains illegal administrative access to as many computers on the Internet as possible and uses these multiple computers to send a flood of data packets to the target computer
(f) Malware
- A generic term for malicious software
(g) Virus
- A piece of software code that inserts itself into a host, including the operating systems, to propagate; it cannot run independently but requires that its host program be run to activate it
(h) Worm
- A software program that runs independently, consuming the resources of its host from within in order to maintain itself and propagating a complete working version of itself onto another machine
(i) Trojan horse
- A program that appears to have a useful function but that contains a hidden function that presents a security risk
Kavungya answered the question on May 9, 2019 at 14:16
- Explain the Major Internet security issues.(Solved)
Explain the Major Internet security issues.
Date posted: May 9, 2019. Answers (1)
- Outline the basic security issues from the company’s perspective.(Solved)
Outline the basic security issues from the company’s perspective.
Date posted: May 9, 2019. Answers (1)
- Outline the Basic Security Issues from the user’s perspective.(Solved)
Outline the Basic Security Issues from the user’s perspective.
Date posted: May 9, 2019. Answers (1)
- List the factors that have contributed to the rise in cyber attacks.(Solved)
List the factors that have contributed to the rise in cyber attacks.
Date posted: May 9, 2019. Answers (1)
- Explain the Hackers, Crackers, and Other Attackers.(Solved)
Explain the Hackers, Crackers, and Other Attackers.
Date posted: May 9, 2019. Answers (1)
- Describe the Intellectual Property Rights.(Solved)
Describe the Intellectual Property Rights.
Date posted: May 9, 2019. Answers (1)
- List the ways of Protection of Privacy.(Solved)
List the ways of Protection of Privacy.
Date posted: May 9, 2019. Answers (1)
- Describe the Order Fulfillment and the Supply Chain.(Solved)
Describe the Order Fulfillment and the Supply Chain.
Date posted: May 9, 2019. Answers (1)
- Outline the EC Order Fulfillment Process.(Solved)
Outline the EC Order Fulfillment Process.
Date posted: May 9, 2019. Answers (1)
- Describe the overview of order fulfillment.(Solved)
Describe the overview of order fulfillment.
Date posted: May 9, 2019. Answers (1)
- Explain the disadvantages of electronic payment systems.(Solved)
Explain the disadvantages of electronic payment systems.
Date posted: May 9, 2019. Answers (1)
- List the Advantages of electronic payment systems.(Solved)
List the Advantages of electronic payment systems.
Date posted: May 9, 2019. Answers (1)
- Outline the steps used to describe the process of electronic checking system.(Solved)
Outline the steps used to describe the process of electronic checking system.
Date posted: May 9, 2019. Answers (1)
- List the disadvantages of Electronic check system.(Solved)
List the disadvantages of Electronic check system.
Date posted: May 9, 2019. Answers (1)
- List the Advantages of Electronic check system.(Solved)
List the Advantages of Electronic check system.
Date posted: May 9, 2019. Answers (1)
- Describe the Electronic Check Payment System:E-Checking.(Solved)
Describe the Electronic Check Payment System:E-Checking.
Date posted: May 9, 2019. Answers (1)
- Describe Global B2B Payments method.(Solved)
Describe Global B2B Payments method.
Date posted: May 9, 2019. Answers (1)
- Describe Person-to-Person Payments method.(Solved)
Describe Person-to-Person Payments method.
Date posted: May 9, 2019. Answers (1)
- Describe the Stored-Value Cards.(Solved)
Describe the Stored-Value Cards.
Date posted: May 9, 2019. Answers (1)
- Describe the E-Cash and Innovative Payment Methods.(Solved)
Describe the E-Cash and Innovative Payment Methods.
Date posted: May 9, 2019. Answers (1)