MIS 3305 Chapter Notes - Chapter 26: Verisign, National Institute Of Standards And Technology, Dumpster Diving

22 views4 pages

Document Summary

Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting. Information security policies identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days. Black-hat hackers break into other people"s computer systems and may just look around or may steal and destroy information. White-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes. Script kiddies find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses. Hactivist have philosophical and political reasons for breaking into systems and will often deface the website as a protest. Cyber terrorist seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents