CIS 2010 Chapter Notes - Chapter 2: Computer Network, Computer Security, Personal Computer

101 views5 pages

Document Summary

To accurately reflect the crucial interdependence between mis and business processes, we should update the old business axiom time is money to say uptime is money. Information security: a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization, the primary tools an organization can use to combat the threats associated with downtime. Security threats caused by hackers and viruses. Hackers: experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge. Drive-by hacking: a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network. Virus: one of the most common forms of computer vulnerabilities, software written with malicious intent to cause annoyance or damage, some hackers create and leave viruses causing massive computer damage.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents