ITM 100 Lecture Notes - Lecture 8: Deep Packet Inspection, Acceptable Use Policy, Machine-Readable Medium
sg418230 and 39832 others unlocked
14
ITM 100 Full Course Notes
Verified Note
14 documents
Document Summary
Acceptable use policy (aup): defines acceptable uses of the firms information resources and computing equipment. Antivirus software: prevents, detects, and removes malware, including computer viruses, computer worms, etc. Application controls: specific controls unique to each computerized application, such as payroll or order processing. Authentication: refers to the ability to know that a person is who he or she claims to be. Biometric authentication: uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access. Botnet: thousands of pc"s infected with malicious software without their owners" knowledge. Business continuity planning: focuses on how the company can restore business operations after a disaster strikes. Click fraud: occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertisers or making a purchase. Computer crime: illegal acts committed with the use of the computer.