COMM 226 Lecture Notes - Lecture 11: Key Escrow, Extraordinary Measures, Smart Card

62 views6 pages

Document Summary

Identity theft: vital info such as your name, address, dob, sin are used for inpersonation: can take over financial accounts, open bank accounts, etc, one of the fastest growing crimes because it is easy to do. What is pipeda: personal information protection and electronic documents act (pipeda) Individual has to file a complaint against an org themselves. Incorrect data modification: faulty service, denial of service, loss of infrastructure, search engines can cause inadvertent disclosure employees may place restricted data on websites that can be uncovered by search engines. Ip spoofing: when an intruder uses another site"s ip as if it were that site: e-mail spoofing: synonym for phishing. Incident response: to be discussed later in chapter. How can technical safeguards protect against security threats: technical safeguards: hardware and software components of an information system. Identification and authentication, encryption, firewalls, malware protection, design for secure applications, etc. Identification and authentication: authentication password authenticates user, authentication methods fall into 3 categories:

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents