Textbook Notes (368,430)
Canada (161,877)
Administration (1,247)
ADM2337 (129)
All (45)
Chapter 8

Chapter 8.docx

6 Pages
Unlock Document

All Professors

Chapter 8 Securing Information Systems System Vulnerability and AbuseSecurity refers to the policies procedures and technical measures used to prevent unauthorized access alteration theft or physical damage to information systemsControls consist of all the methods policies and organizational procedures that ensure the safety of the organizations assets the accuracy and reliability of its accounting records and operational adherence to management standards Fixed internet address creates a fixed target for hackersMalicious Software Viruses Worms Trojan Horses and SpywareMalware malicious software programs that include variety of threats such as computer viruses worms and Trojan Horses Spyware is technology that aids in gathering information abouta person or organization without their knowledge Computer virus is a rogue software program that attaches itself usually without user knowledge or permission to other software programs or data files in order to be executed Worms independent computer programs that copy themselves from one computer to other computers over a network Email worms are currently the most problematicMobile devices viruses pose serious threats to enterprise computing because so many wireless devices are now linked to corporate information systems Trojan Horse is a software program that appears to be benign but then does something unexpected It is not itself a virus because it does not replicate but is often a way for viruses or other malicious code to be introduced into a computer system Keyloggers record every keystroke made on a computer to steal serial numbers for software to launch Internet attacks to gain access to email accounts to obtain passwords to protected computer systems or to pick up potential information such as credit card numbers Hackers and CybervandalismHacker an individual who intends to gain unauthorized access to a computer system Cracker an hacker with a criminal intentSpoofing when hackers attempt to hide their true identities often try spoofing or misrepresenting themselves by using fake email addresses or masquerading as someone else
More Less

Related notes for ADM2337

Log In


Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.