Sociology Questions
Explore questions in the Sociology category that you can ask Spark.E!
a type a malware that modifies or replaces one or more existing progrmas to hide the fact that a computer has been compromised
a DoS attack that uses a directed broadcast to create a flood of network traffic for the victim computer
a person with little or no skill who simply follows directions to carry out attack without fully understanding the meaning of the steps performed
an application that captures traffic as it travels across a network
a network attack in which the attacker attempts to take over an existing connection between two network computers
the amount of money a company loses due to downtime, either intentional or unintentional
intercepting communication sent via a wired connection
software that gathers user info through the user's internet connection without the user's knowledge
an e-mail or instant-message spoofing fraud attempt that targets specific orgaization, seeking unauthorized access to confidential data
any event that results in a violation of any of the CIA security tenets
teams of people organized to identify and responf to security incidents. an IRT is respnsible for minimizing the impact of incident and collection any necessary evidence to analyze the incident
a type of attack in which one person, program, or computer disguises itself as another person, program, or computer to gain access to some resource
a type of fraud in which an attckers attemps to trick the victim into providing private information
a computer attacker who is of auerage abilities and could one day become a black hat.
a software tool that collects information about any known weaknesses that exist on a target computer or network
a type of window that appears on top of the browser windows. pop-ups generally contain ads. although pop-ups are not strictly adware, many adware programs use them to interact with users
a DoS attack that fills up a computer's connection table by sending a flood of unacknowledged connection requests. once the connection table fills up, the computer cannot respond to any new legitimate connection requests
an atack in which the attacker captures data packets from a network and retransmits them to produce an unauthorized effect
unwanted e-,ail or instant messages
a software program that enables a computer to monitor and capture network traffic, including password and data
