Professional Documents
Culture Documents
CHALLENGES…
❑ Rapid technological change
❑ Exploding applications and data
❑ Frequent External Shocks
What is an Anti-Virus?
• Anti-virus is a software (computer program)
that scans files or your computer's memory for
certain patterns that may indicate an infection.
The patterns it looks for are based on the
signatures, or fingerprints, of known viruses.
Once a virus is detected in the wild, the Anti-
Virus companies then release these new
patterns for your Anti-virus software to use.
These updates come out daily by some vendors. Fraud
Virus authors are continually releasing new and • Accessing or using a computer with the intent
updated viruses, so it is important that you have to commit a fraudulent or other criminal act.
the latest definitions installed on your • This can refer to illegally obtaining restricted
computer. data or confidential financial information,
damaging or destroying information contained • Sniffers are used by network/system
in a computer. administrator to monitor and troubleshoot
network traffic. Attackers use sniffers to capture
Service Interruptions and Delays data packets containing sensitive information
• An interruption in transmission that renders such as password, account information etc.
the Service unusable due to a total loss of signal Spoofing
for the Service • Specific type of cyber-attack in which
Intrusions someone attempts to use a computer, device, or
• the act of wrongfully entering upon, seizing, network to trick other computer networks by
or taking possession of the property or masquerading as a legitimate entity
information of another individual
Con Artists
Information Manipulation • A person who cheats or tricks others by
• trying to get someone to believe something persuading them to believe something that is
untrue is deceit. The type of communication not true
created by such deceitful intent is called a
deceptive message
Information Theft
• Also known as identity fraud, is a crime in Phishing
which an imposter obtains key pieces of • Type of online scam where criminals
personally identifiable information (PII), such as impersonate legitimate organizations via email,
Social Security or driver's license numbers, to text message, advertisement or other means in
impersonate someone else. order to steal sensitive information.
The Role of IT