ICT 351 Lecture Notes - Lecture 1: Advance-Fee Scam, Antivirus Software, Internet Fraud

23 views2 pages

Document Summary

For risk to happen you need both: A big portion about security is trying to minimize the risk of an attack. A set of external circumstances that can exploit a vulnerability. Ex: the existence of a particular vulnerability combined with a threat constitute a risk to the system. A weakness in the system that can be exploited by attackers to bypass the standard security mechanism. Risk: only when a threat and vulnerability coexist. Tracing back to the source(s) of the attack. A software patch is a device that fixes vulnerability. As soon as a patch is available, you want to apply it as soon as possible. The larger the time frame, the higher the opportunity for hackers. Users take too long to apply the patch. Difficulties in defending against attacks (know 2 for quiz) Delays in fixing software flaws and vulnerabilities.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents