CAB240 Lecture Notes - Lecture 1: Information Security, Web Browsing History, Critical Infrastructure

240 views5 pages
23 Oct 2018
School
Course

Document Summary

Shopping, gaming, social connections: computer accounts, passwords, and stored files, personal, work related, study related. Where is it stored: corporate information, could include personal information if you are a, client, customer, employee, contractor. System configuration and management processes: trade secrets, transaction records, which of these would an organisation be comfortable for others to access, critical infrastructure, essential for running our society and economy - includes, energy sector. Is there really a problem: cyber-crime refers to electronic crime where: Spear phishing used as infection vector by 71% of groups: mobile malware, app categories with most malicious apps: lifestyle (27%) Example: info security problem: mobile device malware, example, paul ducklin"s article, 21 june 2018, lots of interest in fortnite, no android version, fake versions offered, t&c include fees, charges. Shows ads: downloads other games, not epic games. "facts provided or learned about something or someone: oxford dictionaries. "knowledge derived from study, experience, or instruction: the free dictionary.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents