Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Module 5 Matching 4 responsible for attacks on retail point of sale systems info

ID: 3913622 • Letter: M

Question

Module 5 Matching 4 responsible for attacks on retail point of sale systems information security hackers controlling multiple computers to aid in their effortsstate sponsored attackers viewed as both a goal and a process V three facets that make up the focus on information C. protection 4validates an end user's identity an action with the potential to cause harm V standards designed to protect credit card transactions memory scrapers D.PCI DSS E. CIA F. security threat G. authentication H. distributed attacks l. script kiddies J. security perimeter download programs which do the 'attacking' - have provided an alternate pathway to waging war' on other countries : a modern day mo9at and draw bridge for information protection

Explanation / Answer

Responsible for attacks in retail point of sale systems - B. Memory scrapers

Hacker controlling multiple computers to aid in their efforts - D. Distributed attacks, as here the hackers control or infect multiple computer to aid in greater objective.

Viewed both as a goal and a process - G. Information security, is viewed both as a goal and a process

Three facets that make up the focus on information protection - CIA, Confidentiality, integrity and availability.

Validates an end user's identity - C. Authentication, is the process which validates an end user's identity.

An action with the potential to cause harm - I. Security threat, are the actions which can cause harm.

Standards designed to protect credit card transactions - H. PIC DSS. Ideally it should be Payment Card Industry Data Security Standard (PCI DSS).

Download programs which do the attacking - J. Script kiddies, these persons donwload attack scripts and they are not able to write scrip[ts on their own

Have provided an alternate pathway to waging war on other countries - F. State sponsored attacks

A modern day moat and draw bridge for information protection - A. Security perimeter, for protection of the security

Hope this will help

Please rate

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote