ITM 102 Study Guide - Final Guide: Antivirus Software, Electronic Data Interchange, Enterprise Software

113 views35 pages

Document Summary

Itm 102 business information systems (part 2) Hardware problems (breakdowns, configuration errors, damage from improper use or crime) Software problems (programming errors, installation errors, unauthorized changes) Disaster, e. g. use of networks/computers outside of firm"s control: byod. Size of internet means abuses can have wide impact. Use of fixed internet addresses with cable or dsl modems creates fixed targets for hackers (this is not the default with canadian isps) E-mail, p2p, im: interception, attachments with malicious software, transmitting trade secrets. Ssids (service set identifiers: identify access points, broadcast multiple times (but you can turn off broadcast, evil twins, war driving (and more) Eavesdroppers drive by buildings and try to detect ssid and gain access to network and resources. Wired equivalent privacy (wep: security standard for 802. 11; use is optional, uses shared password for both users and access point, users often fail to implement wep or stronger systems.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents