Copyright Goodheart-Willcox Co., Inc. Chapter 2 Information Security Fundamentals 57 SECTION REVIEW 2.2 Check Your Understanding 1. What is a Trojan or Trojan horse? 2. Software that is preinstalled or embedded in hardware is known as _____. 3. Which type of cookie remains on the computer after the browser is closed until it reaches its expiration date? 4. What is the social engineering technique in which the hacker lies to get information? 5. If you are digging through a trash can for information, what is this hacking technique called? Build Your Key Terms Vocabulary As you progress through this course, develop a personal cybersecurity glossary. This will help you build your vocabulary and prepare you for a career. Write a defi nition for each of the following terms, and add it to your cybersecurity glossary. adware armored virus backdoor cookie policy cryptomalware digital footprint drive-by-download dumpster diving fi rmware heuristic methodology keylogger logic bomb macro virus malware payload persistent cookie polymorphic virus pretexting ransomware remote access Trojan (RAT) rootkit secure cookie session cookie social engineering third-party cookie threat time bomb Trojan horse vulnerability zero-day vulnerability Goodheart-Willcox Publisher Figure 2-16. There are different types of paper shredders. The most secure shredding is achieved with a micro- cut shredder.
Previous Page Next Page