When someone uses your personal information to pose as you, this is
Show
When someone uses your personal information to pose as you this is called?Identity theft is when someone uses your personal information—such as your birth date and social security number—to commit fraud.
What is the term used to describe authentication techniques that rely on personal biological traits?Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they are who they say they are.
What is a program that takes complete control of your computer without your knowledge?backdoor program
A program that enables a hacker to take complete control of a computer without the legitimate user's knowledge or permission.
Which one of the following would not be a benefit of networking computers?Economics are not one of the benefits of computer networks.
|