PHIL 100 Study Guide - Quiz Guide: Cloud Computing, Grid Computing, Phishing

39 views3 pages

Document Summary

Information security is defined as all of the processes and policies designed to protect an organization"s information and information system from unauthorized access, disclosure, use, disruption, modification, or destruction. Threat: any danger to which a system may be exposed. Exposure: is the harm, loss, or damage that can result if a threat compromises an information resource. Vulnerability: is the possibility that the system will be harmed by a threat [weaknesses] Decreasing skills necessary to be a computer hacker. A virus is a harmful software program that attaches itself to other software programs or data files in order to execute. A worm is an independent computer program that copies itself from one computer to another over the network. Dos, denial-of-service, is flooding the server with thousands of false requests to crash the network using 1 computer. Ddos, distributed denial of service is using multiple computers to do the same thing.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents