Computer Science > QUESTIONS & ANSWERS > WGU C840 - All Chapters with complete solution (All)
1. Cyberstalking: The use of electronic communications to harass or threaten another person. 2. Denial of service (DoS) attack: An attack designed to overwhelm the target system so it can no longer r... eply to legitimate requests for connection. 3. Distributed denial of service (DDoS) attack: An attack in which the attacker seeks to infect several machines, and use those machines to overwhelm the target system to achieve a denial of service. 4. Fraud: A broad category of crime that can encompass many different activities, but essentially, any attempt to gain financial reward through deception. 5. Identity theft: Any use of another person's identity. 6. Logic bomb: Malware that executes its damage when a specific condition is met. 7. Rainbow table: Type of password crackers that work with precalculated hashes of all passwords available within a certain character space. 8. Three-way handshake: The process of connecting to a server that involves three packets being exchanged. 9. Virus: Any software that self-replicates. 10. Anti-forensics: The actions that perpetrators take to conceal their locations, activities, or identities. [Show More]
Last updated: 2 years ago
Preview 1 out of 8 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Oct 25, 2022
Number of pages
8
Written in
This document has been written for:
Uploaded
Oct 25, 2022
Downloads
0
Views
96
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·