ITM 102 Study Guide - Quiz Guide: Identity Management, Online Banking, Information Technology Management

151 views4 pages

Document Summary

Jimmy clark is sitting home one night and is very bored. He gets on his computer and starts to surf the net. He thinks he might be able to get around the security of the site and into the military computer system. He spends the next two hours trying to find his way into their system. Answer: can be classified as input controls, processing controls, and output controls. The potential for unauthorized access is usually limited to the communications lines of a network. Many firms spend heavily on security because it is directly related to sales revenue. Fault-tolerant computers contain redundant hardware, software, and power supply components. Dos attacks are used to destroy information and access restricted areas of a company"s information system. Popular im applications for consumers do not use a secure layer for text messages, so they can be intercepted and read by outsiders during transmission over the public internet.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents