Week Nine Flashcards
Acceptable use policy (AUP):
Defines acceptable uses of the firm’s information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and specifies consequences for noncompliance
Malware:
- Computer viruses
- Worms
- Trojan horses
- Ransomware
- SQL injection
- Spyware
Worms:
Programs that copy themselves from one computer to another over networks
Trojan horse:
A software program that appears to be
benign, but then does something
unexpected
Often “transports” a virus into a computer
system
SQL injection:
Hackers submit data to Web forms that sends rogue SQL query to database to perform malicious acts (e.g. delete
segments of the database)
Spyware:
- Key loggers
- Reset browser home page
- Redirect search requests
- Slow computer performance by taking up memory
Spoofing:
Masquerading as someone else, or redirecting a Web link to an unintended address
Sniffing:
An eavesdropping program that monitors information travelling over a network