ITM 100 Lecture Notes - Machine-Readable Medium, Web Server, Wireless Network

86 views4 pages
sg418230 and 39832 others unlocked
ITM 100 Full Course Notes
14
ITM 100 Full Course Notes
Verified Note
14 documents

Document Summary

Security policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Controls all of the methods, policies, and procedures that ensure protection of the organization"s assets, accuracy, and reliability of its records, and operational adherence to management standards. War driving technique in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. Malware malicious software programs such as computer viruses, worms and trojan horses. Computer virus vogue software program that attaches itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions. Worms independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs. Trojan horse a software program that appears legitimate but contains a second hidden function that may cause damage. Spyware technology that aids in gathering information about a person or organization without their knowledge.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents