ITM 100 Lecture Notes - Lecture 8: Anti-Spam Techniques, Risk Assessment, Secure Hypertext Transfer Protocol
sg418230 and 39832 others unlocked
14
ITM 100 Full Course Notes
Verified Note
14 documents
Document Summary
Acceptable use policy (aup) defines acceptable uses of the firm"s information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the internet, and specifies consequences for noncompliance. Antivirus software software designed to detect, and often eliminate, computer viruses from an information system. Application controls specific controls unique to each computerized application that ensure that only authorized data are completely and accurately processed by that application. Authentication the ability of each party in a transaction to ascertain the identity of the other party. Biometric authentication technology for authenticating system users that compares a person"s unique characteristics such as fingerprints, face, or retinal image against a stored set profile of these characteristics. Botnet a group of computers that have been infected with bot malware without users" knowledge, enabling a hacker to use the amassed resources of the computers to launch distributed denial-of-service attacks, phishing campaigns, or spam.