Match the following terms and definitions.
a. | cybercrime | ____ | 1. | Usually targeting the accounting department, these attacks are electronic theft of very small amounts numeroustimes, such as rounding of fractions of a cent from interest calculations |
b. | cyberlaw | ____ | 2. | A form of social engineering, the attacker fishes for sensitive,private data, such as using an authenticlooking fraudulent Web site |
c. | cyber forensics | ____ | 3. | Attacks involving manipulating and tricking individuals into divulging confidential information, such as imposter emails |
d. | pretexting | ____ | 4. | Social engineering attacks that involve creating a scenario and using deception for information gathering purposes |
e. | password sniffing | ____ | 5. | Rummaging through garbage for discarded documents or digital media |
f. | salami attacks | ____ | 6. | Attempts to obtain passwords by reading messages sent on a network |
g. | social engineering | ____ | 7. | Involves collecting, examining, and preventing evidence of cybercrime |
h. | phishing | ____ | 8. | Crimes connected to information assets and IT |
i. | dumpster diving | ____ | 9. | Laws and regulations to prevent, investigate, and prosecute cybercrimes |
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.