New User Special Price Expires in

Let's log you in.

Sign in with Facebook


Don't have a StudySoup account? Create one here!


Create a StudySoup account

Be part of our community, it's free to join!

Sign up with Facebook


Create your account
By creating an account you agree to StudySoup's terms and conditions and privacy policy

Already have a StudySoup account? Login here

CIS 105 Chapt. 11 Notes

by: Brigette Maggio

CIS 105 Chapt. 11 Notes CIS 105

Brigette Maggio
GPA 3.9

Preview These Notes for FREE

Get a free preview of these Notes, just enter your email below.

Unlock Preview
Unlock Preview

Preview these materials now for free

Why put in your email? Get access to more of this material and other relevant free materials for your school

View Preview

About this Document

These were notes cover CIS 105 Chapt. 11.
Computer Appls&Info Technology
Wood, McCarthy
Class Notes
CIS !05
25 ?




Popular in Computer Appls&Info Technology

Popular in Computer Information Systems

This 3 page Class Notes was uploaded by Brigette Maggio on Monday January 4, 2016. The Class Notes belongs to CIS 105 at Arizona State University taught by Wood, McCarthy in Fall 2015. Since its upload, it has received 109 views. For similar materials see Computer Appls&Info Technology in Computer Information Systems at Arizona State University.

Similar to CIS 105 at ASU

Popular in Computer Information Systems


Reviews for CIS 105 Chapt. 11 Notes


Report this Material


What is Karma?


Karma is the currency of StudySoup.

You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!

Date Created: 01/04/16
CIS 105 9/24/15 McCarthy Chapters 2, 4, and 11 Exam #2 next Tuesday­ Sunday Chapter 11­ Security *Computer Security­Concerned with Risk Management, Confidentiality, Integrity, and the  availability of electronic information that is processed and stored in a computing system. *Risk Management­ is the recognition, consequences, and assessment of risk to a computer  system. (disaster recovery plan) Hackers= criminals Hackers­ are people who attempt to invade or disable a computer's security measures and  steal their resources. Hackers also try to hijack computer processing cycles, speed, and storage space. Unsecured computers­ are extremely easy to breach, especially by a seasoned hacker.  Some techniques include: *­(Exe)= on an email is an “executable file­” if you click on it, you want to run that file, but it’s  most likely a virus *•(Mal)= Malicious attachments to emails­ can change the name and it can still be bad •Viruses •Worms •Malware = mal (malicious) *can break into even the most protected, sophisticated, and secure computers *Daren broke into McCarthy’s ex­wife’s computer in 45 seconds­ found info. to get into it by  google *Businesses commonly take advantage of the Internet (Distribution and free browsers) by  setting up Intranets (ex.: myasu) *­The key aspect of an Intranet is privacy *­Intranets are guarded by Firewalls: hardware (Proxy Server) and software that keep unauthorized users out ­myasu is an intranet *­security companies benefit from a virus Malware Threats (Malicious Threats)             •Computer Viruses are files that reproduce by making copies of themselves within a  computer’s memory, storage, or network.  •Experimental Malware written to combat malware. •Worms are like viruses but do not need to attach itself to an existing files to spread.  *•Trojan Horses seem harmless and wait for a computer event to spread and unleash  other malware.  ­beaming­ one app to another with palm pilots  *­viruses run on events and protect content (Ex.: a keystroke, beaming on a  certain date) ­if beam his app, delete his app, delete every app every bought, and delete  operating system, and freeze screen, and wait a month to delete everything so  they can pass on his app and his virus *•Spyware­ is a computer program installed covertly and secretly monitors a user’s  keystrokes and behavior.  •Adware­ is typically more irritating then malicious and usually installed covertly and  automatically display or download advertising to a computer.  *­adware is malware •Spamming or junk mail­ is the abuse of an email system to arbitrarily send typically  millions of unsolicited bulk messages.  *•Denial­of­service attack (DOS)­ attempts to make a computer or any of its resources  unavailable to its users. *most dangerous* *•Reverse Phishing / Keylogging­ is when a user signs into a computer work station  where a malicious software covertly records keystrokes *­Which of the following is malware? adware *­How often does spam have to work in order to be successful? just once ­startup­ check what you’ve opened *­Does the Cloud eliminate the need to back up a file? yes *•Antivirus software­ attempts to identify, prevent, and eliminate computer viruses and  malware.  ­Examines computer files and matches them to known viruses stored in a database.  ­Two of the more popular antivirus softwares: are Symantics Corporation’s Norton  AntiVirus and McAfee’s VirusScan.  ­All computer files should be backed up, but realistically, it’s important to back up files  with high priority. Does the Cloud eliminate the need to back up files? yes *•Strong Passwords = take too long to make it worth trying to crack, 50% of the  time passwords will be found out, and a passphrase is a memorable, strong password  Internet Fraud­ A broad term that refers to any fraudulent activity that occurs in an online  setting.  *•Identity Theft­ is the crime of assuming another’s identity for economic gain (crime) •Click Fraud­ is a program that automatically clicks advertising networks ads, typically  randomly, for pro fit.  •Purchase Scams­ are simply when a unscrupulous merchant does not deliver goods or  services already paid for online.  •Phishing­ is a legitimate looking, socially engineered email attempting to deceptively gain  private information.  Privacy­ can be defined as the ability of an individual to keep their personal information out of  public view Computer privacy­ is an expectation of remaining anonymous while using a computer system  or network.  Tracking Cookies­ are typically text files on a client computer that users are typically unaware  of that keeps track of that user’s information.  Data Mining­ is when experts extract useful information from recorded data, like a cookie. Identity theft­ is a crime concerning the unlawful practice of assuming another individual’s  identity. Identity Theft and Identity Fraud are terms used to refer to all types of crimes in which  someone wrongfully obtains and uses another person’s personal data for fraud and deception.  Shoulder Surfing­ is when a criminal in a public place glances over their victim’s should to gain information like PIN numbers or passwords.  Dumpster Diving­ is sorting through refuse to gain information that most likely should have  been shredded.  SCAM­ Acronym created by the United States Department of Justice in an attempt to guard  personal information.  ­Be Stingy about giving out personal information ­Check your financial information on a regular basis.  ­Ask periodically for your credit report.  ­Maintain careful records. *­NEVER give out social security number *­Primary­ where we work/ volatile *­Secondary­ doesn’t need electricity to work (Cloud is secondary) *­SOPA stands for Stop Online Piracy Act *­type of storage media that is sequential­ magnetic tape


Buy Material

Are you sure you want to buy this material for

25 Karma

Buy Material

BOOM! Enjoy Your Free Notes!

We've added these Notes to your profile, click here to view them now.


You're already Subscribed!

Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'

Why people love StudySoup

Jim McGreen Ohio University

"Knowing I can count on the Elite Notetaker in my class allows me to focus on what the professor is saying instead of just scribbling notes the whole time and falling behind."

Janice Dongeun University of Washington

"I used the money I made selling my notes & study guides to pay for spring break in Olympia, Washington...which was Sweet!"

Bentley McCaw University of Florida

"I was shooting for a perfect 4.0 GPA this semester. Having StudySoup as a study aid was critical to helping me achieve my goal...and I nailed it!"


"Their 'Elite Notetakers' are making over $1,200/month in sales by creating high quality content that helps their classmates in a time of need."

Become an Elite Notetaker and start selling your notes online!

Refund Policy


All subscriptions to StudySoup are paid in full at the time of subscribing. To change your credit card information or to cancel your subscription, go to "Edit Settings". All credit card information will be available there. If you should decide to cancel your subscription, it will continue to be valid until the next payment period, as all payments for the current period were made in advance. For special circumstances, please email


StudySoup has more than 1 million course-specific study resources to help students study smarter. If you’re having trouble finding what you’re looking for, our customer support team can help you find what you need! Feel free to contact them here:

Recurring Subscriptions: If you have canceled your recurring subscription on the day of renewal and have not downloaded any documents, you may request a refund by submitting an email to

Satisfaction Guarantee: If you’re not satisfied with your subscription, you can contact us for further help. Contact must be made within 3 business days of your subscription purchase and your refund request will be subject for review.

Please Note: Refunds can never be provided more than 30 days after the initial purchase date regardless of your activity on the site.