ITM 100 Lecture Notes - Lecture 8: Deep Packet Inspection, Acceptable Use Policy, Machine-Readable Medium

30 views4 pages
sg418230 and 39832 others unlocked
ITM 100 Full Course Notes
14
ITM 100 Full Course Notes
Verified Note
14 documents

Document Summary

Acceptable use policy (aup): defines acceptable uses of the firms information resources and computing equipment. Antivirus software: prevents, detects, and removes malware, including computer viruses, computer worms, etc. Application controls: specific controls unique to each computerized application, such as payroll or order processing. Authentication: refers to the ability to know that a person is who he or she claims to be. Biometric authentication: uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access. Botnet: thousands of pc"s infected with malicious software without their owners" knowledge. Business continuity planning: focuses on how the company can restore business operations after a disaster strikes. Click fraud: occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertisers or making a purchase. Computer crime: illegal acts committed with the use of the computer.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents