COB 204 Chapter Notes - Chapter 7.5: Logic Bomb, Cyberwarfare, Cyberterrorism

26 views2 pages

Document Summary

Common types of deliberate threats to is: espionage or trespass, occurs when an unauthorized individual attempts to gain illegal access to organizational information. Identity theft: the deliberate assumption of another person"s identity, usually to access his or her financial information or to frame him or her for a crime, techniques for illegally obtaining personal information include: b. i. Infiltrating organizations that store large amounts of personal information b. iv. Impersonating a trusted organization in an electronic communication (phishing: compromises to intellectual property a. Intellectual property: the property created by individuals or corporations that is protected under trade secret, patent, and copyright laws. a. i. Trade secret: an intellectual work, such as a business plan, that is a company secret and is not based on public information. (ex. the formula for coca cola) a. ii. Patent: an official document that grants the holder exclusive rights on an invention or a process for a specified period of time a. iii.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents