GMS 200 Lecture Notes - Lecture 9: Cyberterrorism, Cyberwarfare, Intrusion Detection System

48 views4 pages
lily.dilaudo and 39833 others unlocked
GMS 200 Full Course Notes
24
GMS 200 Full Course Notes
Verified Note
24 documents

Document Summary

Itm 100 - securing information systems: system security, without proper security measures, these systems would be next to impossible to use. Information systems are mission critical for many organizations and take advantage of: security, policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems, security and controls. Internet vulnerabilities: network open to anyone, size of internet means abuse can have wide impact, use of fixed internet addresses with cable or dsl modems creates fixed targets for hackers, unencrypted voip, e-mail, p2p, im. Interception: attachments with malicious software, transmitting trade secrets, wireless security challenges, radio frequency bands easy to scan, ssids (service set identifies) Individuals who attempt to gain unauthorized access to a computer system: cracker: a hacker with criminal intent, cyber-vandalism: 2: computer may be instrument of crime, theft of trade secrets, using e-mail for threats or harassment.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents