ITM 100 Chapter Notes - Chapter 8: Denial-Of-Service Attack, Electronic Document, Click Fraud
sg418230 and 39832 others unlocked
14
ITM 100 Full Course Notes
Verified Note
14 documents
Document Summary
Why systems are vulnerable: can stem from technical, organizational , and environmental factors compounded by poor management decisions. Click fraud: when an individual or compute program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase. Internal threats: employees: have access to privileged information, and in the presence of sloppy internal security procedures, they are often able to roam throughout an organization systems without leaving a trace. Software vulnerability: bugs: program code defects, source of bugs is the complexity of decision making code, patches: used to correct software flaws once they are identified, the software vendor creates small pieces of software to repair the flaw. Inadequate security and control may create serious legal liability: businesses must protect not only their own information assets but also those of customers, employees, and business partners.