Principles of Information Systems, Loose-Leaf Version
Principles of Information Systems, Loose-Leaf Version
13th Edition
ISBN: 9781305971820
Author: Ralph Stair, George Reynolds
Publisher: Course Technology
Question
Book Icon
Chapter 13.2, Problem 1CTQ
Program Plan Intro

Hacker:

  • A hacker denotes a skilled computer expert that uses technical knowledge to overcome a problem.
  • The bugs or exploits are been used by hacker to break into computer systems.
  • The hacker is able to subvert computer security.
  • It mostly denotes computer criminals due to unethical tasks performed.
  • It can be stated as a person who messes about with something with positive sense.

Phishing attack:

  • It denotes a fraudulent e-mail sent to retrieve personal data from recipient
  • It is more or less random.
  • The malware may get downloaded to device.
  • It may redirect into fake website to retrieve personal information.
  • The information may be sold in black market for money.

Spear phishing attack:

  • The fraudulent e-mails are sent to employee of an organization.
  • The attack is more precise and narrow.
  • The malware may get installed into particular device.
  • It may be targeted to get sensitive company information or voucher money.
  • The task may be targeted to provide harm to a particular organization.

Communication to thwart attack:

  • The communication sent over email to thwart attack is shown below:
    • The employees should not click on links received in email messages.
    • The employees should not download the payment related mails or messages.
    • The employees may get mails pretending to be from any higher officials, such types of mails should be deleted immediately.
    • The email urging to take immediate action should be monitored carefully.
    • The phishing emails may have improper grammar or misspellings that denote an indication for employees to stay alert.

Blurred answer
Students have asked these similar questions
Of the information security organizations listed in this chapter that have codes of ethics, which has been established for the longest time? When was it founded?
When does information security begin and end for a business? When do security procedures and rules start taking effect, and when do they end? Is it possible, in your opinion, to increase these bounds?
What function does the administration of information security serve in the current setting?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,