ITM 102 Lecture Notes - Lecture 7: Intrusion Detection System, Mobile Device Management, Malware

47 views7 pages

Document Summary

Policies, procedures & technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Methods, policies, & organizational procedures that ensure safety of organization"s assets: accuracy & reliability of its accounting records; & operational adherence to management standards. Hardware problems (breakdowns, configuration errors, damage from improper use/crime) Use of networks/computers outside of firm"s control. Size of the internet means abuses can have wide impact. Use of fixed internet addresses with cable/dsl modems creates fixed targets for hackers. Identify access points, broadcast multiple times, can be identified by sniffer programs. Eavesdroppers drive by building & try to detect ssid & gain access to networks. Once access point is breached, intruder can gain access to networked drives & files. Both viruses & worms are spread by downloads, drive-by downloads, e-mail, im attachments. Slow computer performance by taking up memory. Intentional disruption, defacement, destruction of website or corporate information system. Computer crime (may be target/instrument of crime)

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents