ITM 102 Lecture Notes - Lecture 10: Rogue Security Software, Management Information System, Application Software

43 views5 pages

Document Summary

Trojan horse: a software program that appears to be benign, but then does something unexpected, often a way for viruses or other malicious code to be introduced into a computer system. Hackers and computer crime: hacker - an individual who intends to gain unauthorized access to a computer system, hackers and crackers (hackers with criminal intent) gain unauthorized access by. Risk assessment: determines the level of risk to the rm in the case of improper controls, system developers then concentrate on the control points with the greatest vulnerability and potential loss. Disaster recovery planning: devises plans for the restoration of computing and communications services after they have been disrupted, focuses primarily on the technical issues involved in keeping systems up and running. Business continuity planning: focuses on how the company can restore business operations after a disaster strikes, identi es critical business processes and determines action plans for handling mission critical functions if systems go down.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents