Computer Science 1032A/B Study Guide - Phishing

29 views5 pages
salmonrabbit587 and 40047 others unlocked
COMPSCI 1032A/B Full Course Notes
28
COMPSCI 1032A/B Full Course Notes
Verified Note
28 documents

Document Summary

Sources and types of security threats three main sources of security threats are: human error and mistakes accidental problems caused by both employees and non employees poorly written application programs and poorly designed procedures physical accidents, malicious human activity employees and former employees who intentionally destroy data or other system components hackers who break into a system, virus and worm writers who infect computer systems people who provide millions of unwanted emails (spam) outside criminals who break into a system to steal for financial gain terrorism, natural events and disasters fires floods hurricanes earthquakes tsunamis avalanches. Unauthorized data disclosure can occur by human error when someone inadvertently releases data in violation of policy: pretexting occurs when someone deceives by pretending to be someone else, phishing (or email spoofing) is a similar technique for obtaining unauthroized data that uses pretexting via email, spoofing is another term for someone pretending to be someone else (ip.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers