IST 195 Chapter Notes - Chapter 5: Keystroke Logging, Copyright Infringement, Content-Control Software
Document Summary
Chapter 5: digital security risk: computer/mobile device hardware, software, data, information or processing capability any event or action that could cause a loss/damage to, common digital security risks: and use, hardware theft, software theft, information theft, system failure. Internet +network attacks, unauthorized access: computer crime: illegal act involving the use of a computer or related devices, cybercrime: theft online/internet-based illegal acts; distributing malicious software/ identity, crimeware: Software used by cybercriminals: hacker: computer enthusiast, someone who accesses a computer/network illegally, cracker: destroying data, stealing information or other malicious action. Program that copies itself repeatedly in memory/network, using up resources, possibly shutting down the computer, device, network: trojan horse: not replicate itself to other computers/devices program that hides within/looks like a legitimate program. Program that performs a repetitive task on a network: denial of service attack: Ip spoofing: address is associated with a trusted source.