CIS 1332 Lecture Notes - Lecture 5: Script Kiddie, Industrial Espionage, Cybercrime

42 views4 pages

Document Summary

Module 5: digital security, ethics, and privacy: threats, issues, and defenses. Cybercrime: computer crime: an intentional breach to digital security often involves a deliberate act that is against the law. Internet and network attacks that jeopardize security include: malware, botnets, denial of service attacks, back doors, spoofing. Back doors: back door: a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer or network. Spoofing: spoofing: a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network. Safeguards against internet and network attacks: use antivirus software, be suspicious of unsolicited email attachments, scan removable media for malware before using it, back up regularly. Safeguard against unauthorized access and use: acceptable use policy (aup): outline the activities for which the computer or network may and may not be used.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents