IS 3003 Lecture Notes - Lecture 8: Trojan Horse, Managed Security Service, Phishing

109 views4 pages

Document Summary

Chapter 8: system vulne rabilities improper use or crime. Internet vulnerabilities: network is open to anyone, size of internet means abuses can have wide impact, fixed internet address eases identification by hackers, email attachments, email used for transmitting trade secrets. Im messages lack security, can be easily intercepted: malicious software - malware order to be executed. to others over a network. longer to shut down or turn on. Virus: software program attaches itself to other software or files in. Virus indications: slow computer, shutting down constantly, takes. Worms: computer programs copy themselves from one computer. Virus vs worms: human intervention is necessary for a virus. Trojan horses: program appears to be benign then does something. Spyware: small programs installed on computers to monitor web. Key loggers: record every keystroke on a computer. worm copies themselves automatically. activity and serve up advertising other than expected. 1: hackers & crackers happening in the hacker world.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents