COMMERCE 2KA3 Chapter Notes - Chapter 8: Cryptolocker, Cybercrime, Ransomware

23 views4 pages

Document Summary

Security: policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to is. Controls: methods, policies, and org procedures that ensure safety of the org"s assets. Threats can stem from technical, organizational, and environmental factors. Software problem like programming errors, unauthorized changes etc. War driving: technique in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. Malware: malicious software programs such as computer viruses, worms, and trojan horses. Computer virus: rogue software program that attaches itself to other software programs usually without the user knowledge or permission. Viruses spread from computer to computer when users take action such as sending an e-mail attachment or copying an infected file. Links computer to a virtual computer that can be commanded remotely. Spread over the internet by attacking random ip addresses. Transmitted as an attachment to an e-mail with the subject line i love you.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents