Class Notes (1,100,000)
CA (630,000)
Ryerson (30,000)
ITM (1,000)
ITM 820 (20)
Lecture 1

ITM820 Lecture 1: ITM 820 Week 1.docx


Department
Information Technology Management
Course Code
ITM 820
Professor
Nurul Huda
Lecture
1

This preview shows half of the first page. to view the full 1 pages of the document.
ITM 820 Week 1
Different types of malicious behavior
- Fraud/Theft (money, goods, service, information)
- Vandalism (causing damage for personal reasons)
- Terrorism (causing fear to general public)
- Warfare (causing damage to military assets)
- Espionage (stealing information to get competitive advantage)
- Sabotage (causing damage to get competitive advantage)
- Spam (unsolicited software/ marketing tool)
- Illegal contents (child pornography, hate materials)
4 Basic Principles
Integrity
- Modification of message/file
- Digital signature
Confidentiality
- Encryption
Availability
- ensuring assets and data are available
Non-Repudiation
- Denying access to authorized users
You're Reading a Preview

Unlock to view full version