CIS 105 Lecture Notes - Lecture 11: Workstation, Password Strength, Passphrase

89 views3 pages

Document Summary

Concerned risk management, confidentiality, integrity, the availability of electronic information that is processed and stored in a computing system. The recognition, consequences and assessment of risk to a computer system. People who attempt to invade or disable a computer"s security measures and steal their resources. Hackers also try to hijack computer processing cycles, speed and storage space. (hackers are criminals). Extremely easy to breach, especially by a seasoned hacker. Business commonly take advantage of the internet (distribution and free browsers) by setting up intranets. The key aspect of an intranet is privacy. Intranets are guarded by firewalls, hardware (proxy server) and software that keep unauthorized users out. Computer viruses are flies that reproduce by making copies of themselves within a computer"s memory, storage, or network. Worms are like viruses but do not need to attach itself to an existing files to spread. Trojan horses seem harmless and wait for a computer event to spread and unleash other malware.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents