EIN 5117 Chapter Notes - Chapter 13: Computer Fraud, Bring Your Own Device, Ransomware

55 views5 pages

Document Summary

The threat landscape: the worldwide financial services industry spent . 4 billion on it security and fraud prevention in 2015. Increasing complexity of the computing environment increases vulnerability. Improves employee productivity by allowing workers to use devices with which they are already familiar. Helps to create an image of a company as a flexible and progressive employer. Makes it difficult for it organizations to adequately safeguard devices: reliance on commercial software with known vulnerabilities, exploit- an attack on an information system that takes advantage of a particular system vulnerability. Due to poor system design or implementation: zero-day attack- an attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability. Increasing sophistication of those who would do harm. Infected by opening email attachment or lured to website: viruses- a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents