ITM 102 Lecture Notes - Lecture 8: Phishing, Cyberwarfare, Disaster Recovery
Document Summary
Policies, procedures, and technical measures used to prevent unauthorized access, alteraion, thet , or physical damage to informaion systems. Methods, policies, and organizaional procedures that ensure safety of organizaion"s assets; accuracy and reliability of its accouning records; and operaional adherence to management standards. Hardware problems (breakdowns, coniguraion, errors, damage from improper use or crime) Sotware problems (programming errors, installaion errors, unauthorized changes) Size of internet means abuses can have wide impact. Used of ixes internet addresses wit cable or dsl modems created ixed targets for hackers. Eavesdroppers drive by building and try to detect ssid and gain access to network and resources. Uses shared password for both users and access point. Users oten fail to implement wep or stronger systems. Malicious sotware: viruses, worms, trojan horses, and spyware. Rogue sotware program that atach to other programs in order to be executed, usually without user knowledge or permission. Programs that copy themselves from one computer to another over networks.