COMMERCE 2KA3 Chapter Notes - Chapter 8: Cryptolocker, Cybercrime, Ransomware

23 views4 pages

Document Summary

Security: policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to is. Controls: methods, policies, and org procedures that ensure safety of the org"s assets. Threats can stem from technical, organizational, and environmental factors. Software problem like programming errors, unauthorized changes etc. War driving: technique in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. Malware: malicious software programs such as computer viruses, worms, and trojan horses. Computer virus: rogue software program that attaches itself to other software programs usually without the user knowledge or permission. Viruses spread from computer to computer when users take action such as sending an e-mail attachment or copying an infected file. Links computer to a virtual computer that can be commanded remotely. Spread over the internet by attacking random ip addresses. Transmitted as an attachment to an e-mail with the subject line i love you.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents