ITM 102 Lecture Notes - Lecture 10: Rogue Security Software, Management Information System, Application Software
Document Summary
Trojan horse: a software program that appears to be benign, but then does something unexpected, often a way for viruses or other malicious code to be introduced into a computer system. Hackers and computer crime: hacker - an individual who intends to gain unauthorized access to a computer system, hackers and crackers (hackers with criminal intent) gain unauthorized access by. Risk assessment: determines the level of risk to the rm in the case of improper controls, system developers then concentrate on the control points with the greatest vulnerability and potential loss. Disaster recovery planning: devises plans for the restoration of computing and communications services after they have been disrupted, focuses primarily on the technical issues involved in keeping systems up and running. Business continuity planning: focuses on how the company can restore business operations after a disaster strikes, identi es critical business processes and determines action plans for handling mission critical functions if systems go down.