ADM 2337 Chapter Notes - Chapter 8: Rogue Security Software, Management System, Certificate Authority
Document Summary
Security refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Controls consist of all the methods policies, and organizational procedures that ensure the safety of the organization"s assets, the accuracy, and reliability of its accounting records, and operational adherence to management standards. Fixed internet address creates a fixed target for hackers. Malicious software: viruses, worms, trojan horses, and spyware. Malware- malicious software programs that include variety of threats, such as computer viruses, worms, and trojan horses. Spyware- is technology that aids in gathering information about a person or organization without their knowledge. Computer virus- is a rogue software program that attaches itself, usually without user knowledge or permission, to other software programs or data files in order to be executed. Worms- independent computer programs that copy themselves from one computer to other computers over a network.