ITM 100 Lecture Notes - Machine-Readable Medium, Web Server, Wireless Network
sg418230 and 39832 others unlocked
14
ITM 100 Full Course Notes
Verified Note
14 documents
Document Summary
Security policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Controls all of the methods, policies, and procedures that ensure protection of the organization"s assets, accuracy, and reliability of its records, and operational adherence to management standards. War driving technique in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. Malware malicious software programs such as computer viruses, worms and trojan horses. Computer virus vogue software program that attaches itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions. Worms independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs. Trojan horse a software program that appears legitimate but contains a second hidden function that may cause damage. Spyware technology that aids in gathering information about a person or organization without their knowledge.