Match each item with a statement below.

A. steps that ensure that the individual is who he or she claims to be
B. the process of providing proof of genuineness
C. the act of providing permission or approval to technology resources
D. targeted attacks against financial networks, unauthorized access to information, and the theft of personal information
E. automated attack package that can be used without an advanced knowledge of computers
F. stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain
G. employees, contractors, and business partners who can be responsible for an attack
H. security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data
I. the means by which an attack could occur

A. authentication
B. authorization
C. confidentiality
D. cybercrime
E. exploit kit
F. identity theft
G. insiders
H. integrity
I. threat vector

Computer Science & Information Technology

You might also like to view...

The following is an example of an instruction written in the __________ computer language. 1011000 010100110

a. C++ b. Assembly c. Java d. machine language

Computer Science & Information Technology

In a UNIX directory listing, the __________ period stands for the working directory, and the double period is a synonym for its parent.

a. single/double b. double/single c. neither d. The premise of this question is false.

Computer Science & Information Technology