EIN 5117 Chapter Notes - Chapter 13: Computer Fraud, Bring Your Own Device, Ransomware
Document Summary
The threat landscape: the worldwide financial services industry spent . 4 billion on it security and fraud prevention in 2015. Increasing complexity of the computing environment increases vulnerability. Improves employee productivity by allowing workers to use devices with which they are already familiar. Helps to create an image of a company as a flexible and progressive employer. Makes it difficult for it organizations to adequately safeguard devices: reliance on commercial software with known vulnerabilities, exploit- an attack on an information system that takes advantage of a particular system vulnerability. Due to poor system design or implementation: zero-day attack- an attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability. Increasing sophistication of those who would do harm. Infected by opening email attachment or lured to website: viruses- a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.