COMMERCE 2KA3 Chapter Notes - Chapter 8: Cryptolocker, Cybercrime, Ransomware
Document Summary
Security: policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to is. Controls: methods, policies, and org procedures that ensure safety of the org"s assets. Threats can stem from technical, organizational, and environmental factors. Software problem like programming errors, unauthorized changes etc. War driving: technique in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. Malware: malicious software programs such as computer viruses, worms, and trojan horses. Computer virus: rogue software program that attaches itself to other software programs usually without the user knowledge or permission. Viruses spread from computer to computer when users take action such as sending an e-mail attachment or copying an infected file. Links computer to a virtual computer that can be commanded remotely. Spread over the internet by attacking random ip addresses. Transmitted as an attachment to an e-mail with the subject line i love you.