HTI 404 Lecture Notes - Lecture 5: Scada, Business Continuity Planning, Dumpster Diving

81 views4 pages

Document Summary

Transactions are collected together (in a batch) Satisfied with the batch will then be entered into the system. Cold site empty space, ready for equipment. Warm site computer, but not software applications. Hot site computers and software in place. Pretending to be a company manager of an information systems employee. Following behind an employee to enter restricted areas. Watching over someone"s shoulder to view data or passwords. Infiltrating organizations that store large amounts of person information (e. g. data aggregators such as acxiom) Impersonating a trusted organization in an electronic communication (phishing) Copying a software program without making payment to the owner. Patent: grants the holder exclusive rights on an invention or process for 20 years. Virus, worm, phishing attack, spear phishing attack. Knows your actual computer that you are using. Dmz = controlled by organization, public can access. Allow remote users to access the company network. Provide flexibility to access the network remotely.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers