ITM 100 Lecture Notes - Lecture 8: Anti-Spam Techniques, Risk Assessment, Secure Hypertext Transfer Protocol

41 views4 pages
sg418230 and 39832 others unlocked
ITM 100 Full Course Notes
14
ITM 100 Full Course Notes
Verified Note
14 documents

Document Summary

Acceptable use policy (aup) defines acceptable uses of the firm"s information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the internet, and specifies consequences for noncompliance. Antivirus software software designed to detect, and often eliminate, computer viruses from an information system. Application controls specific controls unique to each computerized application that ensure that only authorized data are completely and accurately processed by that application. Authentication the ability of each party in a transaction to ascertain the identity of the other party. Biometric authentication technology for authenticating system users that compares a person"s unique characteristics such as fingerprints, face, or retinal image against a stored set profile of these characteristics. Botnet a group of computers that have been infected with bot malware without users" knowledge, enabling a hacker to use the amassed resources of the computers to launch distributed denial-of-service attacks, phishing campaigns, or spam.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents