ADM 2337 Chapter Notes - Chapter 8: Rogue Security Software, Management System, Certificate Authority

87 views6 pages
9 Jun 2014
Department
Course
Professor

Document Summary

Security refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Controls consist of all the methods policies, and organizational procedures that ensure the safety of the organization"s assets, the accuracy, and reliability of its accounting records, and operational adherence to management standards. Fixed internet address creates a fixed target for hackers. Malicious software: viruses, worms, trojan horses, and spyware. Malware- malicious software programs that include variety of threats, such as computer viruses, worms, and trojan horses. Spyware- is technology that aids in gathering information about a person or organization without their knowledge. Computer virus- is a rogue software program that attaches itself, usually without user knowledge or permission, to other software programs or data files in order to be executed. Worms- independent computer programs that copy themselves from one computer to other computers over a network.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents