CIS 105 Lecture Notes - Lecture 8: Antivirus Software, Password Strength, Data Mining

140 views3 pages

Document Summary

Chapters 2, 4, and 11 exam #2 next tuesday- sunday. *computer security-concerned with risk management, confidentiality, integrity, and the availability of electronic information that is processed and stored in a computing system. *risk management- is the recognition, consequences, and assessment of risk to a computer system. (disaster recovery plan) Hackers- are people who attempt to invade or disable a computer"s security measures and steal their resources. Hackers also try to hijack computer processing cycles, speed, and storage space. Unsecured computers- are extremely easy to breach, especially by a seasoned hacker. *-(exe)= on an email is an executable file- if you click on it, you want to run that file, but it"s most likely a virus. * (mal)= malicious attachments to emails- can change the name and it can still be bad: viruses worms malware = mal (malicious) *can break into even the most protected, sophisticated, and secure computers.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents