Software attack also referred to as digital extortion.
What is ransomware?
A segment of computer code that performs malicious actions by attaching to another computer program.
What is a virus?
A group of 8 bits.
What is a byte?
A computer program that searched for specific information by key words.
What is a search engine?
The deliberate assumption of another person's identity.
What is identity theft?
An attack using deception to acquire sensitive personal information.
What is phishing?
A logical grouping of related related records, a data file.
What is a table?
A learning situation in which teachers and students do not meet face-to-face.
What is distance learning?
A created property that is protected under trade secret, patent, and copyright laws.
A malicious and self-replicating segment of computer code.
What is a worm?
A diagram the represents entities in a database and their relationships.
What is a data model?
A type of collaboration in which an organization outsources a task to a large undefined group of people in the form of an open call.
What is crowdsourcing?
An unintentional threat categorized as a variety of mistakes by an employee.
What are human errors?
Sending an overwhelming amount of information requests through many computers.
What is a distributed denial-of-service (ddos) attack?
A characteristic or quality of a particular entity.
What is an attribute?
An integration of all forms of communications through a single software platform.
What is unified communications?
An attack in which the perpetrator uses social skills to trick and manipulate employees into providing confidential information.
What is social engineering?
A segment of computer code embedded within existing programs designed to execute a destructive action at a certain time.
What is a logic bomb?
A field of one table that uniquely identifies a row of another table.
What is a foreign key?
A single point of entry through a Web browser to an entire community of affiliated interests.
What is an affinity portal?