Chapter 10 - E-Commerce Security Flashcards
Originally, the term _____ was used to describe a dedicated programmer who enjoyed writing complex codes that tested the limits of technology.
Hacker
______ refers to preventing data delays or denials.
Necessity
______ refers to programs that are embedded transparently in Web pages and that cause action to occur.
Active content
A(n) is a small application program.
Applet
Java is a programming language developed by ______.
Sun Microsystems
A(n) ______ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting data or stealing data.
Backdoor
A(n) ____ is software that attaches itself to another program and can cause damage when the host program is activated.
Virus
________ is the electronic defacing of an existing Web site’s page.
Cybervandalism
_____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
Spoofing
_____ encryption encodes a message with an algorithm that uses a single numeric key, such as 7373737, to encode and decode data.
Symmetric