COMMERCE 2KA3 Chapter Notes - Chapter 8: Rogue Security Software, Ransomware, Deep Packet Inspection
Document Summary
Fraud and abuse act, which makes it illegal to access a computer system without authorization. Information systems specialists may create software errors as they design and develop new software or maintain existing programs. Software vulnerability: growing complexity and size of software programs, couple with demands for timely delivery to markets, have contributed to an increase in software flaws or vulnerabilities, bugs software program code defects. Monitor the use of system software and prevent unauthorized access and use of software programs, system software, and computer programs. Ensure that computer hardware is physically secure and check for equipment malfunctions; organizations that are critically dependent on their computers also must make provisions for backup or continued operation to maintain constant service. Oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data.