Your Panther Id

Your first and Last Name

Date mm/dd/yyyy

Your email

  1. Phishing is when someone sends an email pretending to be a legitimate company and asking for confidential data, such as account numbers.

  2. Spoofing is a technique for intercepting computer communications. 

  3. When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, this is called a denial of service attack.

  4. Any action, device, procedure, technique, or other measure that reduces a system’s vulnerability to a threat is a safeguard.

  5. A retinal scan would be considered a biometric authentication technique.

  6. Technical safeguards involve the hardware and software components of an information system.  

  7. Biometric authentication has been around for some time, and because of weaknesses are not likely to see much usage in the future.

  8. There are two types of encryption - symmetric and asymmetric.    

  9. With symmetric encryption, both parties use the same key.    

  10. About 90% of all viruses are spread via