Documente Academic
Documente Profesional
Documente Cultură
Security-refers to the policies, procedures and technical measures used to prevent unauthorized
access, alteration, theft, or physical damage to information systems.
Controls are methods, policies, an organizational procedure that ensure the safety of the
organization's assets; the accuracy and reliability of its records; and operational adherence to
management standards.
• When large amount of data is stored in electronic form, they are vulnerable to
many more kinds of threats than when they exist in manual form.
• Most common threats against contemporary information systems are from
technical, organizational, and environmental factors compounded by poor
management decisions.
• Large public networks, such as internet are more vulnerable than internal
networks because they are virtually open to anyone.
• Vulnerability also increased from widespread use of e-mail, instant messaging
(IM), and peer-to-peer file-sharing programs.
c) Computer Crime
• U.S Department of Justice define computer crime as “any violations of criminal
law that involve a knowledge of computer technology for their perpetration,
investigation, or prosecution”.
• The most economically damaging kinds of computer crime are DoS attacks,
introducing viruses, theft of services, and disruption of computer systems.
d) Identity Theft
• With the growth of the Internet and electronic commerce, identity theft has become
especially troubling. Identity theft is a crime in which an imposter obtains key
pieces of personal information, such as social security numbers, to impersonate
someone else.
• The information may be used to obtain credit, merchandise, or services in the name
of the victim or to provide the thief with false credentials.
• Phishing- involves setting up fake Web sites or sending e-mail or text messages
that look like those of legitimate businesses to ask users for confidential personal
data. The message instructs recipients to update or confirm records by providing
social security numbers, bank and credit card information, and other confidential
data either by responding to the e-mail message, by entering the information at a
bogus Web site, or by calling a telephone number.
• New phishing techniques called evil twins and pharming are harder to detect. Evil
twins are wireless networks that pretend to offer trustworthy Wi-Fi connections to
the Internet, such as those in airport lounges, hotels, or coffee shops.
• Pharming redirects users to a bogus web page, even when the individual types the
correct Web page address into his or her browser.
e) Click Fraud
• Click fraud occurs when an individual or computer program fraudulently clicks on
an online ad without any intention of learning more about the advertiser or making
purchase. Click fraud has become a serious problem at Google and other Web sites
that feature pay-per-click online advertising.
A major problem with software is the presence of hidden bugs or program code
defects.