ITM 100 Chapter Notes - Chapter 8: Denial-Of-Service Attack, Electronic Document, Click Fraud

23 views6 pages
sg418230 and 39832 others unlocked
ITM 100 Full Course Notes
14
ITM 100 Full Course Notes
Verified Note
14 documents

Document Summary

Why systems are vulnerable: can stem from technical, organizational , and environmental factors compounded by poor management decisions. Click fraud: when an individual or compute program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase. Internal threats: employees: have access to privileged information, and in the presence of sloppy internal security procedures, they are often able to roam throughout an organization systems without leaving a trace. Software vulnerability: bugs: program code defects, source of bugs is the complexity of decision making code, patches: used to correct software flaws once they are identified, the software vendor creates small pieces of software to repair the flaw. Inadequate security and control may create serious legal liability: businesses must protect not only their own information assets but also those of customers, employees, and business partners.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents