COMMERCE 2KA3 Chapter Notes - Chapter 8: Rogue Security Software, Ransomware, Deep Packet Inspection

49 views12 pages

Document Summary

Fraud and abuse act, which makes it illegal to access a computer system without authorization. Information systems specialists may create software errors as they design and develop new software or maintain existing programs. Software vulnerability: growing complexity and size of software programs, couple with demands for timely delivery to markets, have contributed to an increase in software flaws or vulnerabilities, bugs software program code defects. Monitor the use of system software and prevent unauthorized access and use of software programs, system software, and computer programs. Ensure that computer hardware is physically secure and check for equipment malfunctions; organizations that are critically dependent on their computers also must make provisions for backup or continued operation to maintain constant service. Oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents