-
Phishing is when someone sends an
email pretending to be a legitimate company and asking for
confidential data, such as account numbers.
-
Spoofing is a technique for
intercepting computer communications.
-
When a hacker floods a Web server
with millions of bogus service requests so that it cannot service
legitimate requests, this is called a denial of service attack.
-
Any action, device, procedure,
technique, or other measure that reduces a system’s vulnerability to
a threat is a safeguard.
-
A retinal scan would be considered a
biometric authentication technique.
-
Technical safeguards involve the
hardware and software components of an information system.
-
Biometric authentication has been
around for some time, and because of weaknesses are not likely to
see much usage in the future.
-
There
are two types of encryption - symmetric and asymmetric.
-
With
symmetric encryption, both parties use the same key.
-
About 90%
of all viruses are spread via