ITM 102 Chapter Notes - Chapter 8: Computer Virus, Online Transaction Processing, Public Key Infrastructure

108 views5 pages

Document Summary

In order to run a business, the business needs to make security and control a top priority. Security is the policies, procedures, and technical measures used to prevent unauthorized access to is. Controls are methods, policies, and organizational procedures that ensure that the safety of the organization"s assets, and the accuracy and reliability of its records. Wireless networks do not have basic protection against war driving. Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. Software programs that intend to do harm are referred to as malware and include many different threats. A computer virus is a rogue software program that attaches itself to other software programs or data files in order to be executed. Worms are independent computer programs that copy themselves from one computer to other over a network. Can operate on their own without attaching to other computer program files.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents