139) The term ________
is typically used to denote a hacker with criminal intent.
140) ________ is the intentional disruption, defacement, or even destruction of a Web site or corporate information system.
141) ________
also may involve redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination.
142) A ________
is a type of eavesdropping program that monitors information travelling over a network.
143) In a ________, hackers flood a network server or Web server with many thousands of false communications or requests for services to crash the network.
144) ________ involves setting up fake Web sites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.
145) ________
redirects users to a bogus Web page, even when the individual types the correct Web page address into his or her browser.
146) ________
occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase.
147) ________ is
tricking people into revealing their passwords or other information by pretending to be legitimate users or members of a company in need of information.
148) Growing complexity and size of software programs, coupled with demands for timely delivery to markets, have contributed to an increase in software ________ or vulnerabilities.