ISYS111 Lecture Notes - Lecture 14: Identity Theft, Phishing, Logic Bomb

14 views4 pages
Unintentional threats to information systems:
Unintentional threats:
Acts that users perform with no malicious intent
Includes human error, deviations in the quality of service by service providers
and environmental hazards
Human errors:
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows page 1 of the document.
Unlock all 4 pages and 3 million more documents.

Already have an account? Log in

Document Summary

Unintentional threats to information systems: unintentional threats, acts that users perform with no malicious intent. Deliberate threats to information systems: deliberate threats, espionage or trespass. Information extortion: sabotage or vandalism, threat of equipment and information. Segment of computer code that performs malicious actions by attaching to another computer program. Segment of computer code that performs malicious actions and will replicate or spread by itself (without requiring another computer program) Phishing attack uses deception to acquire sensitive personal. Spear phishing attack information by masquerading as official-looking emails or instant messages. Perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will be able to obtain sensitive, personal information. Attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes (ceases to function) An attacker first takes over many computers, typically by using malicious software.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents