Computer Science 1032A/B Lecture Notes - Malware, Adware, Phishing

70 views5 pages
salmonrabbit587 and 40047 others unlocked
COMPSCI 1032A/B Full Course Notes
28
COMPSCI 1032A/B Full Course Notes
Verified Note
28 documents

Document Summary

Three sources of security threats, a problem with security of info or data, are human error and mistakes, malicious human activity and natural events and disasters. Human errors and mistakes include accidental problems. Malicious human activity includes employees and former employees who intentionally destroy data and other system components. (includes hackers) Malicious human activity also includes outside criminals who break into a system to steal for financial gains. Unauthorized data disclosure can occur by human error when someone inadvertently release data in violation of policy. Pretexting occurs when someone deceives by pretending to be someone else. Phishing is a similar technique for obtaining unauthorized data that uses pretexting via email. Spoofing is another term for someone pretentding to be someone else. Ip spoofing occurs when an intruder uses another site"s ip address. Email spoofing is a synonym for phishing. Sniffing is a technique for intercepting computer communications.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions