ITM 100 Chapter Notes - Chapter 8: Management Information System, Rogue Security Software, Trojan Horse

138 views8 pages
sg418230 and 39832 others unlocked
ITM 100 Full Course Notes
14
ITM 100 Full Course Notes
Verified Note
14 documents

Document Summary

Security: policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to info systems. Controls: methods, policies a(cid:374)d orga(cid:374)izatio(cid:374)al procedures that e(cid:374)sure safet(cid:455) of orga(cid:374)izatio(cid:374)"s assets, accuracy and reliability of its accounting records and operational adherence to management standards. Use of net(cid:449)orks/co(cid:373)puters outside of fir(cid:373)"s co(cid:374)trol. The size of the internet means attacks can cause major damage. Use of fixed internet addresses with cable and digital subscriber line (dsl) modems create fixed tagets for hackers. Issues with email, peer to peer sharing programs, instant messaging. Interception: attachments with malicious software, transmitting trade secrets. Radio frequency bands are easy to scan. Local area networks (lans) using 802. 11 standard are easy to penetrate using: laptops. Securing information systems: external antennae, hacking software. Ssids (service set indicators) identify wifi access points, broadcast multiple times. War driving: eavesdroppers drive by buildings and try to detect ssid and gain access to network and resources.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents