21.0k views
2 votes
Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans A software program specifically designed for computer forensic investigations Federal legislation aimed specifically at computer crime A type of fraud in which the perpetrator steals small amounts from many different accounts A malicious software program embedded in another innocent-looking one A software program or hardware device designed to prevent unauthorized data communications Malicious software similar to a computer virus

1 Answer

4 votes

Answer:

Step-by-step explanation:

1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)

2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)

3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)

4. A software program specifically designed for computer forensic investigations - (EnCase)

5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)

6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)

7. Malicious software similar to a computer virus -- (_worm)

8. Federal legislation aimed specifically at computer crime (CFAA)

User Eugen Dubrovin
by
7.5k points