OMIS2000- Chapter Notes

Ex netflix o freefreemium revenue model firms offer

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: individual types the correct web page address into the browser. o Its possible if a perpetrator gains access to the Internet address information. o Click fraud Occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase. • Serious problem at websites that feature pay per click online advertising. • Example; fraudulently click on a competitors ads to weaken them by driving up their marketing costs. o Global threats: cyberterrorism and cyberwarfare OMIS 2000 Final Exam Gahtan 29 Vulnerabilities of the Internet make digital networks easy targets for digital attacks by terrorists, foreign intelligence services, or other groups seeking to create widespread disruption and harm. Cyberciminal activities: launching malware, DoS attacks, and phishing probes. Internal threats: employees • Security threats often originate inside an organization o Employees have access to confidential information and able to roam through an orgs system without leaving a trace. • Have Inside knowledge • Know of Sloppy security procedures • Can Use Social engineering: • Tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information • End users and information spets are also major source of errors: o End users – introduce errors by entering faulty data or not following instructions for processing data o IS spets – create software errors as they design and develop new software or m...
View Full Document

This note was uploaded on 03/28/2014 for the course OMIS 2000 taught by Professor Hk during the Fall '13 term at York University.

Ask a homework question - tutors are online