ISYS111 Lecture Notes - Lecture 14: Identity Theft, Phishing, Logic Bomb
![](https://new-preview-html.oneclass.com/rBRgqlv0YP2XQykxBegqj5V9M6zyxZLD/bg1.png)
Unintentional threats to information systems:
• Unintentional threats:
• Acts that users perform with no malicious intent
• Includes human error, deviations in the quality of service by service providers
and environmental hazards
• Human errors:
find more resources at oneclass.com
find more resources at oneclass.com
Document Summary
Unintentional threats to information systems: unintentional threats, acts that users perform with no malicious intent. Deliberate threats to information systems: deliberate threats, espionage or trespass. Information extortion: sabotage or vandalism, threat of equipment and information. Segment of computer code that performs malicious actions by attaching to another computer program. Segment of computer code that performs malicious actions and will replicate or spread by itself (without requiring another computer program) Phishing attack uses deception to acquire sensitive personal. Spear phishing attack information by masquerading as official-looking emails or instant messages. Perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will be able to obtain sensitive, personal information. Attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes (ceases to function) An attacker first takes over many computers, typically by using malicious software.