From Mainframe to Client/Server to World Wide Web
Security Considerations for small businesses
Security Considerations for Home and Personal Online Use
Acronyms
100

________ refers to the ability to verify a system's or a persons identity.

What is Authentication

100

PPTP

What is Point-to-Point Tunneling Protocol

100

Inserting into a legitimate Web page links that lead to fake forms or downloads for malware

What is Clickjacking

100

Hypertext Transfer Protocol

What is HTTP

200

Best describes data.

What are Facts and figures and

Collection of recordings

200

The following are included in CLM

What is VPN client, VPN server, Transmission media 

200

Software designed to damage or disrupt the operation of a system

What is Malware

200

Internet Protocol Security

What is IPSec

300

BBS

What is Bulletin Board System

300

"Contact us" forms are an example of what?

What is limited two-way communication

300

Refers to an attack whereby all the files and folders on a computer system are encrypted and held for ransom

What is Ransomeware

300

Virtual private network

What is VPN

400

A method for moving data over a network.

What is Packet Switching

400

Protocol that is used by HTTPS for encrypting data between client and host

What is SSL

400

E-commerce scams

What is a mimic site

400

Simple Mail Transfer Protocol

What is SMTP

500

An early computer network that featured searches through a file tree

What is Gopher

500

Currency that you purchase with a credit, charge, or debit card and download to your computer or smart card

What is Electronic cash

500

An attack in which the attacker pretends to be someone else to gain the trust necessary to get personal information

What is Pretexting

500

Software as a Service

What is SaaS