MG 306 Lecture Notes - Lecture 9: Trojan Horse, Online Identity, Phishing
Document Summary
The estimate is at least 300 and going up as the city puts up more cameras on the corners for traffic control. There is a new face recognition software being deployed everywhere. Smash it with a hammer is the only way. Companies are required to maintain a safe environment in which you work. Part of that is for the network to be free of any kind of harassment of one employee by another. Harassment not only includes physical; it also includes cyber and internal e- mails. Companies are permitted to check e-mails to make sure company information and secrets are not being compromised either. That means every keystroke is recorded, and then transmitted somewhere to be used by someone for possible malicious: a big issues these day are zombie. Software is placed on your computer that is date activated or command activated to perform specific tasks on behalf of someone else.