ITEC 1010 Chapter Notes - Chapter 9: Geographic Information System, Dumpster Diving, Online Gambling

60 views5 pages

Document Summary

Chapter 9: the personal and social impact of computers. Monitoring policies and procedures: monitor routine practices and take corrective action if necessary day-to-day activities, organizations can make adjustments or develop new procedures. Computer crime undelivered merchandise or nonpayment identity theft credit card fraud auction fraud. Cyberterrorism: homeland security department"s information analysis and infrastructure protection. Directorate to serve as a focal point for threat assessment, warning, investigation, and response for threats or attacks against the country"s critical infrastructure cyberterrorist: intimidates or coerces a government or organization to advance his political or social objectives. The computer as the object of crime illegal access and use data alteration and destruction information and equipment theft software and internet piracy computer-related scams international computer crime. Once installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators: a type of trojan horse that executes when specific conditions occur.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents