MG 306 Lecture Notes - Lecture 9: Trojan Horse, Online Identity, Phishing

101 views4 pages
School
Course
Professor

Document Summary

The estimate is at least 300 and going up as the city puts up more cameras on the corners for traffic control. There is a new face recognition software being deployed everywhere. Smash it with a hammer is the only way. Companies are required to maintain a safe environment in which you work. Part of that is for the network to be free of any kind of harassment of one employee by another. Harassment not only includes physical; it also includes cyber and internal e- mails. Companies are permitted to check e-mails to make sure company information and secrets are not being compromised either. That means every keystroke is recorded, and then transmitted somewhere to be used by someone for possible malicious: a big issues these day are zombie. Software is placed on your computer that is date activated or command activated to perform specific tasks on behalf of someone else.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents