IS 3003 Chapter Notes - Chapter 8: Online Transaction Processing, Business Process, Password

57 views2 pages

Document Summary

Is 3003 : ch 8 : securing is. Study online at quizlet. com/_1pvxlv: system vulnerability and abuse, hardware problems. An unprotected computer connected to internet may be disabled within seconds. Breakdowns, configuration errors, damage from improper use or crime: software problems. Programming errors, installation errors, unauthorized changes: disasters (natural or. Power failures, flood, fires, and so on: key loggers: Records every keystroke on a computer: hackers, cracker, white hat. Proficient and knowledgeable people who try to understand system vulnerabilities. Young people interested in knowing what"s happening in the hacker world. Domestic or offshore outsourcing vendors, mobile devices: cybervandalism: Redirecting web link to address different than intended one. Hackers try to grab information while it"s being transferred over a medium. Flooding server with thousands of false requests to crash the network: distributed. Anti-virus software: phishing, malicious software (malware, virus, worms, trojan horse, spyware, key loggers, virus, virus indications: Software program attaches itself to other software or files in order to be executed.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents