RMG 300 Lecture Notes - Lecture 5: Hacker International, Network Administrator, Data Security

49 views3 pages

Document Summary

Org and more vulnerable today: all of this connectivity and interdependence affects this, connect computers. Interdependence: data storage, networked, hardware capabilities, smaller, faster, cheaper computers and storage devices, more tools available for the hacker, easier to be a computer hacker. Social engineering: sending emails from a supposed reliable source. Impersonation: pretending to be a company manager of an is employee, tailgating, following behind an employee to enter restricted areas, shoulder surfing, watching over so(cid:373)eo(cid:374)e"s shoulder to (cid:448)ie(cid:449) data or pass(cid:449)ords. Theft of equipment: data security breaches, equipment is very small now (e. g. 32gb usb) can be taken easily. Identity theft: stealing physical mail, dumpster diving: finding sensitive trash, stealing personal information in computer databases. Infiltrating organizations that store large amounts of personal info (e. g. data aggregators such as. Impersonating a trusted organization in an electronic communication (phishing) Protection of intellectual property: piracy, copying a software program without making payment to the owner, trade secret, e. g.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents