Term
|
Definition
Refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. |
|
|
Term
|
Definition
Methods, Policies, and organizational procedures that ensure the safety of the organizations assets, the accuracy and reliability of its records, and operational adherence to management standards. |
|
|
Term
|
Definition
eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. |
|
|
Term
|
Definition
Malicious software programs that include a variety of threats, such as computer viruses, worms, and Trojan horses. |
|
|
Term
|
Definition
rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission. |
|
|
Term
|
Definition
Independent computer programs that copy themselves from one computer to other computers over a network. These can operate on their own without attaching to other computer program files and rely less on human behavior in order to spread from computer to computer. |
|
|
Term
|
Definition
software program that appears to be benign but then does something other than expected. (Does not replicate). |
|
|