Target o Intentionally accessing a protected computer and causing damage

Target o intentionally accessing a protected computer

This preview shows page 1 - 3 out of 3 pages.

Target: o Intentionally accessing a protected computer and causing damage, negligently or deliberately. o Knowingly transmitting a program, program code, or command that intentionally causes damage to a protected computer. Instrument: o Theft of trade secrets o Unauthorized copying of software or copyrighted intellectual property, such as articles, books, music, and video. e. Define identity theft and phishing and explain why identity theft is such a big problem today. Identity theft is a crime in which an imposter obtains key pieces of personal information, such as social security identification numbers, driver’s license numbers, or credit card numbers, to impersonate someone else. Phishing is an internet scam designed to trick individuals into giving up personal information under the guise of a legitimate company. The amount of information we put out over the internet is the reason for the increase in identity theft. Our entire lives are computer-based and anytime there’s that much information stored in any location there will always be someone trying to get it.
f. Describe the security and system reliability problems created by employees. Employees are the weakest link in the security of any system. A system can have the latest and greatest security tech available, but if employees don’t use it properly the technology might as well not be there. The security threats aren’t always intentional, social engineering is making a comeback as security technology gets better and lower level employees gain higher level system access. g. Explain how software defects affect system reliability and security. Growing complexity and size of software programs, coupled with demands for timely delivery to markets, have contributed to an increase in software flaws or vulnerabilities. Bugs, or program code defects, are virtually impossible to eliminate from large programs and usually stem from complex decision-making code. These bugs can lead to degraded system function or security. Once a bug has been identified a patch can be made to correct the code error without disturbing system operation.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture