31266 Lecture Notes - Lecture 5: Keystroke Logging, Data Scraping, Adware

59 views5 pages
21 Oct 2017
School
Course
Professor

Document Summary

They look like legitimate program to your computer"s operating program. We explained adware, spyware and spam ware that can be bundled up with trojans: adware: software that causes pop-up advertisements to appear on your screen, spyware: software that collects personal information about users without their consent. Two common types of spyware are keystroke loggers and screen scrapers: spam ware: that uses your computer as a launch pad for spammers, we discussed elements of a security program, senior management involvement. Risk management including: risk assessment, risk mitigation, continual evaluation. To accept the potential risk and continue operating the it system or to implement controls to lower the risk to an acceptable level. To avoid the risk by eliminating the risk cause and/or consequence (e. g. , shut down the system when risks are identified) To limit the risk by implementing controls that minimize the adverse impact of a threat"s exercising a vulnerability (e. g. , use of supporting, preventive, detective controls)

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents