ITM 102 Study Guide - Final Guide: Antivirus Software, Electronic Data Interchange, Enterprise Software
Document Summary
Itm 102 business information systems (part 2) Hardware problems (breakdowns, configuration errors, damage from improper use or crime) Software problems (programming errors, installation errors, unauthorized changes) Disaster, e. g. use of networks/computers outside of firm"s control: byod. Size of internet means abuses can have wide impact. Use of fixed internet addresses with cable or dsl modems creates fixed targets for hackers (this is not the default with canadian isps) E-mail, p2p, im: interception, attachments with malicious software, transmitting trade secrets. Ssids (service set identifiers: identify access points, broadcast multiple times (but you can turn off broadcast, evil twins, war driving (and more) Eavesdroppers drive by buildings and try to detect ssid and gain access to network and resources. Wired equivalent privacy (wep: security standard for 802. 11; use is optional, uses shared password for both users and access point, users often fail to implement wep or stronger systems.