COMMERCE 2KA3 Study Guide - Final Guide: Business Continuity Planning, Keystroke Logging, Identity Management

64 views4 pages

Document Summary

Security: policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Controls: methods, policies, and organizational procedures that ensure safety of organizations assets, accuracy and reliability of its accounting records, and operational adherence to management standards. Use of networks/ computers outside of firms control. Accessibility of networks internet vulnerabilities: network open to anyone size of internet means abuses can have wide impact use of fixed internet addresses with cable or dsl modems creates fixed targets for hackers unencrypted voip. Email p2p, im (interception, attachments with malicious software, transmitting trade secrets) Ssid (service set identifiers): identify access points, broadcast multiple times, war driving (eavesdroppers drive by buildings and try to detect ssid and gain access to network and resources). Computer viruses: rogue software programs that attach to other programs in order to be executed. Worms: programs that copy themselves from one computer to another over networks.