ITM 100 Chapter Notes - Chapter 8: Machine-Readable Medium, Intrusion Detection System, Secure Hypertext Transfer Protocol

52 views6 pages
sg418230 and 39832 others unlocked
ITM 100 Full Course Notes
14
ITM 100 Full Course Notes
Verified Note
14 documents

Document Summary

Security: refers to the policies, procedures and technical support measures used to prevent unauthorized access, alteration, theft or physical damage to information systems. Controls: methods, policies and organizational procedures the ensures the safety of organization"s assets, the accuracy and reliability of its records and operational adherence to management standards. Poor management can cause unauthorized access, abuse and fraud. Introduction of error or accessing system without authorized by client error can cause harm. Denial attacks and malicious software can disrupt website operations. Systems malfunctions if computer hardware breaks down, is not configured properly or damaged by improper use of criminal act. Errors in programming, improper installation or unauthorized changes cause software to fail. Domestic or offshore partnering with another company adds to system vulnerability. Without strong safeguards, valuable data can be lost, destroyed or fall into wrong hands. Devices are prone to viruses, malicious software and penetration from outsiders; allow intruders to access internal corporate systems.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents