IST 195 Chapter Notes - Chapter 5: Keystroke Logging, Copyright Infringement, Content-Control Software

53 views9 pages

Document Summary

Chapter 5: digital security risk: computer/mobile device hardware, software, data, information or processing capability any event or action that could cause a loss/damage to, common digital security risks: and use, hardware theft, software theft, information theft, system failure. Internet +network attacks, unauthorized access: computer crime: illegal act involving the use of a computer or related devices, cybercrime: theft online/internet-based illegal acts; distributing malicious software/ identity, crimeware: Software used by cybercriminals: hacker: computer enthusiast, someone who accesses a computer/network illegally, cracker: destroying data, stealing information or other malicious action. Program that copies itself repeatedly in memory/network, using up resources, possibly shutting down the computer, device, network: trojan horse: not replicate itself to other computers/devices program that hides within/looks like a legitimate program. Program that performs a repetitive task on a network: denial of service attack: Ip spoofing: address is associated with a trusted source.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents