Question

Module 5 Matching 4 responsible for attacks on retail point of sale systems information security hackers controlling multiple computers to aid in their effortsstate sponsored attackers viewed as both a goal and a process V three facets that make up the focus on information C. protection 4validates an end users identity an action with the potential to cause harm V standards designed to protect credit card transactions memory scrapers D.PCI DSS E. CIA F. security threat G. authentication H. distributed attacks l. script kiddies J. security perimeter download programs which do the attacking - have provided an alternate pathway to waging war on other countries : a modern day mo9at and draw bridge for information protection

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Solution

Responsible for attacks in retail point of sale systems - B. Memory scrapers

Hacker controlling multiple computers to aid in their efforts - D. Distributed attacks, as here the hackers control or infect multiple computer to aid in greater objective.

Viewed both as a goal and a process - G. Information security, is viewed both as a goal and a process

Three facets that make up the focus on information protection - CIA, Confidentiality, integrity and availability.

Validates an end user's identity - C. Authentication, is the process which validates an end user's identity.

An action with the potential to cause harm - I. Security threat, are the actions which can cause harm.

Standards designed to protect credit card transactions - H. PIC DSS. Ideally it should be Payment Card Industry Data Security Standard (PCI DSS).

Download programs which do the attacking - J. Script kiddies, these persons donwload attack scripts and they are not able to write scrip[ts on their own

Have provided an alternate pathway to waging war on other countries - F. State sponsored attacks

A modern day moat and draw bridge for information protection - A. Security perimeter, for protection of the security

Hope this will help

Please rate

Add a comment
Know the answer?
Add Answer to:
Module 5 Matching 4 responsible for attacks on retail point of sale systems information security hackers...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT