ITM 102 Lecture : Chapter 8.doc

64 views6 pages

Document Summary

Security refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Controls are methods, policies, and organizational procedures that ensure the safety of the org assets, the accuracy and reliability of its records, and operational adherence to management standards. War driving- in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. Malicious software programs are referred to as malware and include a variety of threats such as computer viruses, worms, and trojan horses. Computer virus is a rogue software program that attaches itself to other software programs or data files in order to be executed usually without user knowledge or permission. Worms- independent computer programs that copy themselves from 1 computer to other computers over a network. A trojan horse is a software program that appears to be benign but then does something other than expected.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions