MCS 2020 Lecture Notes - Lecture 12: Email Spoofing, Teijin, Adware

49 views9 pages

Document Summary

By the end of this unit, you should be able to: Recognize the sources and types of security and identity threats. Explain the elements of a security program. Describe how technical safeguards, data safeguards and human safeguards protect against security threats. Enumerate what is necessary for disaster preparedness. Describe how organizations should respond to security incidents. Sources and types of security and identity threats. Unauthorized data disclosure can occur by human error when someone inadvertently releases data in violation of policy. An example at a university would be a new department administrator who posts student names, numbers, and grades in a public place, when the releasing of names and grades violates provincial law (pipeda) Popularity and efficacy of search engines have created another source of inadvertent disclosure. Proprietary and personal data can also be released maliciously. Pretexting occurs when someone deceives by pretending to be someone else.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents