A+ GRADED. Buy Quality Materials!
Downtime
Refers to a period of time when a system is unavailable
Costs of Downtime
Financial Performance
Revenue
Damaged Reputation
Other Expenses
Information Security
encompasses the protection of information from accidental or intentional misuse by
persons inside or outside an organization.
Hackers
experts in technology who use their knowledge to break into computers and computer
networks, either for profit or just motivated by the challenge
Common forms of viruses
Backdoor programs
Denial of service
Trojan horse virus
Worms
Hacker weapons
Elevation of privilege
Hoaxes
Malicious code
Packet tampering
Sniffer
Spoofing
Spyware
Adware
software that, while purporting to serve some useful function and often fulfilling that
function, also allows Internet advertisers to display advertisements without the consent
of the computer user
Spyware
a special class of adware that collects data about the user and transmits it over the
Internet without the user's knowledge or permission
The majority of security incidents originate within the organization
Insiders
Social Engineering
Dumpster diving
Information Security Policies
Identify the rules required to maintain information security
Information Security Plan
Details how an organization will implement the information security policies