CS 202 Lecture Notes - Lecture 3: Health Insurance Portability And Accountability Act, Cyberwarfare, Internet Crime Complaint Center

41 views8 pages

Document Summary

Lecture 3: refers to the protection of computer, information systems, data and information against unauthorized access, use, manipulation, or destruction. More information is being saved digitally on systems that are connected to public and wireless private networks. Total information security: securing all components of the global digital information infrastructure from mobile phones to pcs, drones, networks, routers, and wireless networks. Cyber crimes can impact your privacy, information, property, and. Machine-level security money: refers to actions taken to protect information on a computer that may or may not be connected to a computer network or the internet, multiple levels: The greatest threat to information on a computer is through network (cid:272)o(cid:374)(cid:374)e(cid:272)tio(cid:374)s(cid:863) Authentication: only way to fully protect a computer is to eliminate access to the machine by anyone other than authorized users. Authentication is a security process in which the identity of a person is verified. 2nd step: a token or id card like a key fob or smart card.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents