The degree of protection against criminal activity, danger, damage, and/or loss.
Large-scale, distributed measurement and control systems.
Contains general principles to guide the proper use of the Internet.
Segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date.
A type of biometric recognition technique used to enable user authentication.
Unsolicited email, usually advertising for products and services.
A system that prevents a specific type of information from moving between un-trusted networks.
The probability a threat will impact an information resource.
A type of software deployed as a deliberate threat to an information system.
Typically a password, known only to the attacker, that allows them to access a computer system at will, without having to go through any security procedures.
Software that uses your computer as a launch pad for spammers..
Segment of computer code that performs malicious actions, and will replicate, or spread, by itself (without requiring another computer programs).
Requires a user to agree to follow it to be provided access to a corporate email, information system, and the Internet.
One of the types of signals used in Morse code.
A group of binary digits (or bits). Usually grouped in eights.
Classic movie starring Donald Sutherland and Jane Fonda.
Area located between two firewalls. Typically used to handle web page requests and emails.
The process of converting an original message into a form that cannot be read by anyone except the intended receiver.
True or False: acting ethically and legally are always the same thing.
The deliberate assumption of another person's identity, usually to gain access to their financial information, or to frame them for a crime.
Entails perpetrators finding out as much information about an individual as possible to improve their changes that phishing techniques will be able to obtain sensitive, personal information.