ITM 102 Lecture Notes - Lecture 8: Phishing, Cyberwarfare, Disaster Recovery

15 views7 pages

Document Summary

Policies, procedures, and technical measures used to prevent unauthorized access, alteraion, thet , or physical damage to informaion systems. Methods, policies, and organizaional procedures that ensure safety of organizaion"s assets; accuracy and reliability of its accouning records; and operaional adherence to management standards. Hardware problems (breakdowns, coniguraion, errors, damage from improper use or crime) Sotware problems (programming errors, installaion errors, unauthorized changes) Size of internet means abuses can have wide impact. Used of ixes internet addresses wit cable or dsl modems created ixed targets for hackers. Eavesdroppers drive by building and try to detect ssid and gain access to network and resources. Uses shared password for both users and access point. Users oten fail to implement wep or stronger systems. Malicious sotware: viruses, worms, trojan horses, and spyware. Rogue sotware program that atach to other programs in order to be executed, usually without user knowledge or permission. Programs that copy themselves from one computer to another over networks.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents