Filter By
Filter Reset
Lectures
  • All Lectures
  • Lecture 1 (8)
  • Lecture 2 (6)
  • Lecture 3 (2)
  • Lecture 4 (3)
  • Lecture 5 (5)
  • Lecture 6 (5)
  • Lecture 7 (5)
  • Lecture 8 (2)
  • Lecture 9 (3)
  • Lecture 10 (2)
  • Lecture 11 (3)
  • Lecture 12 (2)
  • Lecture 13 (2)
  • Lecture 14 (2)
  • Lecture 15 (2)
  • Lecture 16 (2)
  • Lecture 17 (2)
  • Lecture 18 (1)
  • Lecture 19 (1)
  • Lecture 20 (1)
  • Lecture 21 (1)
  • Lecture 22 (1)
  • Lecture 23 (1)
  • Lecture 24 (1)
  • Lecture 25 (1)
  • Lecture 26 (1)
  • Lecture 27 (1)
  • Lecture 28 (1)
  • Lecture 29 (1)
  • Lecture 30 (1)
  • Lecture 31 (1)
  • Lecture 32 (1)
Semester
Class Notes (1,031,985)
CA (591,715)
York (41,773)
ITEC (382)
ITEC 1000 (92)

Class Notes for ITEC 1000 at York University (page 3)

Introduction to Information Technologies

ITEC 1000 Lecture Notes - Lecture 2: Ebay, Online Gambling, Cybercrime
Premium

ITEC 1000 Lecture 2 Notes Recovery of Stolen Property and The computer as a tool to fight crime Introduction Representative Jim McDermott, who has offered a bill to levy federal and state taxes on Internet gambling, estima...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture Notes - Lecture 10: Copyright Infringement, Darik'S Boot And Nuke, Asus
Premium

ITEC 1000 Lecture 10 Notes Patent and Copyright Violations Introduction Simply deleting files and emptying the Recycle Bin does not make it impossible for determined individuals to view the data. Be sure to use diskwiping ...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture Notes - Lecture 3: Geographic Information System, Zip Code
Premium

ITEC 1000 Lecture 3 Notes Use of Geographic Information Systems and Monitoring Sex Offenders Introduction Monitoring Sex Offenders Offender Watch is a Webbased system used to track registered sex offenders. It stores the r...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture 7: ITEC 1000 Lecture 7 Notes
Premium

ITEC 1000 Lecture 7 Notes Information and Equipment Theft Introduction Government officials in India suspect China of infecting several computers with spyware in a section of the Indian Ministry of External Affairs that de...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture Notes - Lecture 9: Ebay, Botnet, Data Theft
Premium

ITEC 1000 Lecture 9 Notes Safe Disposal of Personal Computers Introduction The botnet was shut down through a series of arrests in Spain. The Kneber botnet runs on infected computers spread across 126 countries and is desi...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture Notes - Lecture 8: Botnet, Heartland Payment Systems, Albert Gonzalez
Premium

ITEC 1000 Lecture 8 Notes Data Theft: An Ongoing Concern for Businesses Introduction Educational Credit Management Corp. (ECMC) is a nonprofit organization that assists with managing student loans for borrowers that enter ...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture Notes - Lecture 6: Premium-Rate Telephone Number, Keystroke Logging, Antivirus Software
Premium

ITEC 1000 Lecture 6 Notes Spyware Introduction Criminal hackers used a clever Trojan horse program that, when installed on a victims computer altered the text displayed by HTML code to either erase evidence of a money tran...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture Notes - Lecture 5: Albert Gonzalez, Debit Card
Premium

ITEC 1000 Lecture 5 Notes Disgruntled Introduction Insiders are employees, disgruntled or otherwise, working solo or in concert with outsiders to compromise corporate systems. The biggest threat for many companies is not e...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture Notes - Lecture 4: Cargonet, Crime Mapping, Copyright Infringement
Premium

ITEC 1000 Lecture 4 Notes Illegal Access and Use Introduction The National Equipment Registry maps mobile equipment thefts in areas where peak equipment thefts have occurred so police and equipment owners can take appropri...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture 13: ITEC 1000 Tutorial 13 Notes
Premium

ITEC 1000 Tutorial 13 Notes Reviewing Policies and Procedures Introduction The final step is to review existing policies and procedures and determine whether they are adequate. During review, people should ask the followin...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture Notes - Lecture 16: Threat Assessment
Premium

ITEC 1000 Tutorial 16 Notes Cyber terrorism Introduction In general, criminals need two capabilities to commit most computer crimes. First, the criminal needs to know how to gain access to the computer sys...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture Notes - Lecture 17: Leon Panetta, Computer Security, Robert Mueller
Premium

ITEC 1000 Tutorial 17 Notes Identity Theft Introduction Successful cyber-attacks against the facilities that provide these services could cause widespread and massive disruptions to the normal function of...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture Notes - Lecture 15: Cybercrime
Premium

ITEC 1000 Tutorial 15 Notes The computer as a tool to commit crime Introduction The hackers would then sell the stocks at the high price before the victims were aware of what had happened. Although...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture Notes - Lecture 12: Sap Erp, Computer Security, Arbitrage
Premium

ITEC 1000 Tutorial 12 Notes Monitoring Policies and Procedures Introduction Users should implement proper procedures to ensure correct input data. Training is another key aspect of implementation. ...

Information Technology
ITEC 1000
Christianne Stephens
ITEC 1000 Lecture Notes - Lecture 14: Antivirus Software
Premium

ITEC 1000 Tutorial 14 Notes Computer crime Introduction Even good IS policies might not be able to predict or prevent computer crime. A computers ability to process millions of pieces of data in less than ...

Information Technology
ITEC 1000
Christianne Stephens

Log In


OR

Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


OR

By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.


Submit