Computer Science 1032A/B Chapter Notes - Chapter 12: Strong Authentication, Personal Information Protection And Electronic Documents Act, Cybercrime

76 views7 pages
salmonrabbit587 and 40047 others unlocked
COMPSCI 1032A/B Full Course Notes
28
COMPSCI 1032A/B Full Course Notes
Verified Note
28 documents

Document Summary

Identity theft: vital information that"s stolen to facilitate impersonation: person"s name, address, dob, sin, etc . Identity thief can take over victim"s financial accounts. Involves stealing/misrepresenting/hijacking identity of another person/business. If there are issues, individual should file complaint against organization w/ office of. Include initial loss of capability/service and losses stemming from actions to recover from initial problem. 5 types of security problems: unauthorized data disclosure, faulty service. Incorrect data modification: denial of service, loss of infrastructure. Ip spoofing: occurs when intruder uses another site"s ip address. Drive- by sniffers: take computers w/ wireless connection through area and search for unprotected wireless networks. Can monitor and intercept wireless traffic @ will. Faulty service: hacking: occurs when person gains unauthorized access to computer system. Invade systems for purpose of stealing/modifying data for financial gain: problems that result b/c of incorrect system operation. 364: can occur by human error when inadvertently make procedural mistakes.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents