Match each item with a statement below.
A. steps that ensure that the individual is who he or she claims to be
B. the process of providing proof of genuineness
C. the act of providing permission or approval to technology resources
D. targeted attacks against financial networks, unauthorized access to information, and the theft of personal information
E. automated attack package that can be used without an advanced knowledge of computers
F. stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain
G. employees, contractors, and business partners who can be responsible for an attack
H. security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data
I. the means by which an attack could occur
A. authentication
B. authorization
C. confidentiality
D. cybercrime
E. exploit kit
F. identity theft
G. insiders
H. integrity
I. threat vector
You might also like to view...
Using the Magic Wand Tool, the ____ check box selects only adjacent areas using the same colors.
a. Neighbor b. Contiguous c. Sample All Layers d. none of the above
____________________ functions are mathematical algorithms that generate a message summary or digest (sometimes called a fingerprint) that can be used to confirm the identity of a specific message and/or confirm that there have not been any changes to the content.
Fill in the blank(s) with the appropriate word(s).
List five benefits of using Excel worksheets.
What will be an ideal response?
The Functions pane lists the messages we can send that object to get information from it.
Answer the following statement true (T) or false (F)