Information security risks abound in today’s information age. How many risks below can you correctly match with their definitions?
1. Virus | A. Deliberate malicious damage or destruction of property. |
2. Worm | B. Illegally implanted non-replicating computer code that does damage to local computer when launched. |
3. Malware | C. Hidden method for bypassing computer’s authentication system. |
4. Botnet | D. A process or state of combustion in which fuel is ignited and combined with oxygen to produce light, heat and flame |
5. Theft | E. Computer program that captures or records keystrokes to illegally obtain passwords or encryption keys. |
6. Rootkit | F. Any type of software that has a malicious intent. |
7. Backdoor | G. Illegally implanted computer code that destroys data when the program is downloaded. |
8. Spyware | H. Army of infected computers formed by a virus that orders the infected machines to follow instructions from attacker. |
9. Keylogger | I. Illegally implanted computer code that intends to take control of the computer operating system without the owner’s consent |
10. Fire | J. An attempt to make computer resources unavailable to intended users. |
11. Trojan Horse | K. A segment of self-replicating, illegally implanted computer code that is intended to damage or shut-down a computer or network. |
12. Vandalism | L. Software that secretly records information about a person or organization. |
13. Distributed Denial of Access | M. The wrongful taking of property of another. |
Answers: 1. G, 2. K, 3. F, 4. H, 5. M, 6. I, 7. C, 8. L, 9. E, 10. D, 11. B, 12. A, 13. J.