BUSI 3040U Chapter Notes - Chapter 4: Trade Secret, Keystroke Logging, Business Continuity Planning

86 views15 pages
30 May 2014
School
Department
Professor

Document Summary

Security --> the degree of protection against criminal activity, danger, damage and/or loss. Information security --> all of the processes and policies designed to protect an organization"s information and information systems (is) from unauthorized access, use, disclosure, disruption, modification or destruction. Threat --> to an information resource is any danger to which a system may be exposed. Exposure --> of an information resource is the harm, loss or damage that can result if a threat compromises that resource. Vulnerability --> possibility that the system will be harmed by a threat. Trusted network any network within your organization. Untrusted network any network external to your organization. Scripts internet contains information and computer programs that users with few skills can download and use to attack any information system connected to the internet. Cybercrime illegal activities conducted over computer networks, particularly the internet. Two main categories of threats are: unintentional threats, deliberate threats.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents