IS 3003 Chapter Notes - Chapter 8: Online Transaction Processing, Business Process, Password
Document Summary
Is 3003 : ch 8 : securing is. Study online at quizlet. com/_1pvxlv: system vulnerability and abuse, hardware problems. An unprotected computer connected to internet may be disabled within seconds. Breakdowns, configuration errors, damage from improper use or crime: software problems. Programming errors, installation errors, unauthorized changes: disasters (natural or. Power failures, flood, fires, and so on: key loggers: Records every keystroke on a computer: hackers, cracker, white hat. Proficient and knowledgeable people who try to understand system vulnerabilities. Young people interested in knowing what"s happening in the hacker world. Domestic or offshore outsourcing vendors, mobile devices: cybervandalism: Redirecting web link to address different than intended one. Hackers try to grab information while it"s being transferred over a medium. Flooding server with thousands of false requests to crash the network: distributed. Anti-virus software: phishing, malicious software (malware, virus, worms, trojan horse, spyware, key loggers, virus, virus indications: Software program attaches itself to other software or files in order to be executed.