Please match the following A Responsible or attacks on retail point of sale syst
ID: 3733420 • Letter: P
Question
Please match the following A Responsible or attacks on retail point of sale systems security perimeter 8. Memory scrapers Hackers controlling multiple computers to aid in their efforts Viewed as both a goal and a process C Authentication D. Distributed attacks CIA State sponsored attackers Information security L-vl Three facets that make up the focus on information E. protection Validates an end user's identity G. An action with the potential to cause harm H. pic DSS Standards designed to protect credit card transactionsI Download programs which do the 'attacking Have provided an alternate pathway to 'waging war' on J. Script kiddies other countries EA modern day moat and draw bridge for information protectionExplanation / Answer
Answer)
Responsible for attacks in retail point of sale systems - B. Memory scrapers, are responsible for attacks for POS.
Hacker controlling multiple computers to aid in their efforts - D. Distributed attacks, as here the hackers control or infect multiple computer to aid in greater objective.
Viewed both as a goal and a process - G. Information security, is viewed both as a goal and a process
Three facets that make up the focus on information protection - CIA, Confidentiality, integrity and availability.
Validates an end user's identity - C. Authentication, is the process which validates an end user's identity.
An action with the potential to cause harm - I. Security threat, are the actions which can cause harm.
Standards designed to protect credit card transactions - H. PIC DSS. Ideally it should be Payment Card Industry Data Security Standard (PCI DSS).
Download programs which do the attacking - J. Script kiddies, these persons donwload attack scripts and they are not able to write scrip[ts on their own
Have provided an alternate pathway to waging war on other countries - F. State sponsored attacks
A modern day moat and draw bridge for information protection - A. Security perimeter, for protection of the security
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.