| Term 
 
        | As security is increased, convenience is often increased. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In information security, what can constitute a loss?     |  | Definition 
 
        | ALL OF THE ABOVE   Theft of information   a delay in transmitting information that results in a financial penalty   the loss of good will or a reputation |  | 
        |  | 
        
        | Term 
 
        | In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Select the term that best describes automated attack software? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Smart phones give the owner of the device the ability to download security updates. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data. |  | Definition 
 | 
        |  |