COMM 226 Chapter Notes - Chapter 12: Email Spoofing, Social Insurance Number, Personal Information Protection And Electronic Documents Act

32 views18 pages

Document Summary

Q3) what type of security threats do organizations face: three sources of security threats are, human errors and mistakes. Fires, floods, hurricanes, earthquakes, tsunamis, avalanches, tornados, and other acts of nature. Occurs when someone devices by pretending to be someone else. Involves a telephone caller who pretends to be from a credit card company and claims to be checking the validity of credit card numbers: phishing. Is a similar technique for obtaining unauthorized data, and it uses pretexting via email: spoofing. Is another term for someone pretending to be someone else. Ip spoofing occurs when an intruder uses another site"s ip. Email spoofing is a synonym for phishing: sniffing. Balancing costs and benefits: safeguards, protections against security threats. Incident response: must plan for prior to incidents. Q4) how can technical safeguards protect against security threats: technical safeguards involve the hardware and software components of an information systems, identification and authentication.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents