Web page formatting is typically done using this.
That is HTML
This is a type of agreement, document or contract that defines acceptable and unacceptable uses of computers and network resources for an organization.
That is a Netowork usage policy
The 2002 law designed to fight corporate corruption by imposing tough reporting requirements and internal controls on electronic financial records.
That is Sarbanes-Oxley
A person with advanced computer and network skills who gains illegal entry to a computer system to destroy data, steal information or cause others harm.
That is a Cracker
Using a network to destroy or damage computer systems for political reasons' usually requires years of planning, lots of money, and a team of skilled people.
That is Cyberterrorism.
A typed messages sent from one user to another over the Internet that does not require the users to be online at the same time to exchange communications.
That is E-mail
The destructive outcome from a computer virus or worm.
That is It's payload.
Access ID card, fingerprints and something you know are all examples of this.
That are forms or user authentication
A person who uses a microcomputer system or terminal to penetrate the security of a remoter computer system, usually for the thrill or bragging rights.
That is a Hacker
A person who accesses a computer system with malicious intent but does not have the requisite technical skills to be successful.
That is Script Kiddie
Your computer needs a unique one of these to connect to the internet.
That is an IP Address
When a person is tricked into giving up private information that can be used for identity theft, they have become a victim of this.
That is Fishing
When you only back up files that have changed since the last time you did a backup, you perform this.
That is Incremental backup.
Unauthorized copying or use of computer programs.
That is Software Piracy
Manipulating programs or data so that many small dollar amounts are taken from a large volume of transactions or accounts and accumulated elsewhere.
That is Salami Shaving.
Process of placing telephone calles via the internet; Skype for example.
That is Voice over the Internet (VOIP)
True or false: myC@T8amouse is a strong password.
True
An electronic "card: sent with Internet transaction data to verify the sender.
That is an SSL certificate
Similar to a worm, this type of program requires a host such as email to be transmitted; tile must be opened in order for the program to perform its payload.
That is a Virus
Programs or short code segments designed to commit a malicious act as soon as the unsuspecting program user performs some specific operation, such as deleting a record, or pressing certain keys.
That is Logic/Time Bombs.
Limewire is an example of this type of network (and was recently ordered to shut down for copyright infringement)
That is P2P
The area of law enforcement that focuses on information security.
That is Computer forensics
A computer that carries out actions-often malicious-under remote control of a hacker or bot-herder.
That is a Zombie
Adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties.
That is a Trojan Horse.
Self-replicating software program designed to enter a computer system or network through security holes.
That is a Worm