CIS 2010 Chapter Notes - Chapter 2: Computer Network, Computer Security, Personal Computer
Document Summary
To accurately reflect the crucial interdependence between mis and business processes, we should update the old business axiom time is money to say uptime is money. Information security: a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization, the primary tools an organization can use to combat the threats associated with downtime. Security threats caused by hackers and viruses. Hackers: experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge. Drive-by hacking: a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network. Virus: one of the most common forms of computer vulnerabilities, software written with malicious intent to cause annoyance or damage, some hackers create and leave viruses causing massive computer damage.