PHIL 100 Study Guide - Quiz Guide: Cloud Computing, Grid Computing, Phishing
Document Summary
Information security is defined as all of the processes and policies designed to protect an organization"s information and information system from unauthorized access, disclosure, use, disruption, modification, or destruction. Threat: any danger to which a system may be exposed. Exposure: is the harm, loss, or damage that can result if a threat compromises an information resource. Vulnerability: is the possibility that the system will be harmed by a threat [weaknesses] Decreasing skills necessary to be a computer hacker. A virus is a harmful software program that attaches itself to other software programs or data files in order to execute. A worm is an independent computer program that copies itself from one computer to another over the network. Dos, denial-of-service, is flooding the server with thousands of false requests to crash the network using 1 computer. Ddos, distributed denial of service is using multiple computers to do the same thing.