Secretly collects information about users / Negatively affects
confidentiality / Negatively affects availably / Tracking cookies and browser history can be used by spyware / It is greyware
Spyware
(Choose all that apply.)
Use a browser add-on / Disable
Adobe Flash / Anti-malware
programs
Threat vectors
Logic Bomb
UEFI, Secure Boot
Chain of Trust
Import security template
Automated patch update service
Supply chain infection
Restricting patch management
Dynamic analysis
Keyed entry lock
Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.
Barricade
Staging stage
Moisture
Service pack
Network OS
Cable lock
Using the security mechanisms on a standard Wi-Fi network.
It monitors and controls two interlocking doors to a room.
Waterfall model
Requires periodic visual inspections
deadbolt lock
The bytes of a virus are placed in different "piles" and then used to create a profile.
Variable overflow
Group Policy
Whitelist
Supply chains take advantage of the trusted "chain of trust" concept.
A virtualized environment is created and the code is executed in it.