COMMERCE 2KA3 Lecture Notes - Lecture 14: Symmetric-Key Algorithm, Public-Key Cryptography, Intrusion Detection System

27 views3 pages

Document Summary

Security: policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Controls: methods, policies, and organizational procedures that ensure safety of organization"s assets; accuracy and reliability of its accounting records; and operational adherence to management standards. Reasons systems are vulnerable: hardware problems, software problems, disasters, use of networks/computers outside of firm"s control, loss and theft of portable devices, accessibility of networks. Computer viruses: rogue software programs that attach to other programs in order to be executed. Worms: programs that copy themselves from one computer to another over networks. Trojan horse: a software program that appears to be benign, but then does something unexpected. Sql injection attacks: hackers submit data to web forms that exploits site"s unprotected software and sends rogue sql query to database. Spyware: keylogging records keystrokes made on a keyboard. Spoofing: masquerading as someone else, or redirecting a web link to an unintended address.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents