Chapter 6 - Chapter 6 Securing Information Systems You are...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 6 – Securing Information Systems You are responsible for the definitions of the following terms/information: 1. Information system security – p. 232 Precautions taken to keep all aspects of information systems safes from unauthorized use or access. 2. Viruses – p. 235 Destructive programs that disrupt the normal functioning of computer systems. 3. Worms – p. 235 Destructive computer code that is designed to copy and send itself throughout network computers. 4. Spyware – p. 235 Software that covertly gathers information about a user through the Internet connection without the user’s knowledge. 5. Adware – p. 236 A special type of spyware which collects information about a person in order to customize Web browser banner advertisements. 6. Spam – p. 236 Electronic junk mail. 7. Phishing – p. 237 Attempts to trick financial account and credit card holders into giving away their authorization information, usually by sending spam messages to literally millions of e-mail accounts. Also known as spoofing.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 05/10/2010 for the course ACCT ISDS taught by Professor Cope during the Spring '10 term at S.E. Louisiana.

Page1 / 2

Chapter 6 - Chapter 6 Securing Information Systems You are...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online