ITM 100 Chapter Notes - Chapter 8: Management Information System, Rogue Security Software, Trojan Horse
sg418230 and 39832 others unlocked
14
ITM 100 Full Course Notes
Verified Note
14 documents
Document Summary
Security: policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to info systems. Controls: methods, policies a(cid:374)d orga(cid:374)izatio(cid:374)al procedures that e(cid:374)sure safet(cid:455) of orga(cid:374)izatio(cid:374)"s assets, accuracy and reliability of its accounting records and operational adherence to management standards. Use of net(cid:449)orks/co(cid:373)puters outside of fir(cid:373)"s co(cid:374)trol. The size of the internet means attacks can cause major damage. Use of fixed internet addresses with cable and digital subscriber line (dsl) modems create fixed tagets for hackers. Issues with email, peer to peer sharing programs, instant messaging. Interception: attachments with malicious software, transmitting trade secrets. Radio frequency bands are easy to scan. Local area networks (lans) using 802. 11 standard are easy to penetrate using: laptops. Securing information systems: external antennae, hacking software. Ssids (service set indicators) identify wifi access points, broadcast multiple times. War driving: eavesdroppers drive by buildings and try to detect ssid and gain access to network and resources.