Page 20 - 6485
P. 20

legitimate or not, they should contact bank before responding. Banks will

               also want to know about fraudulent emails.


                       Another  common  scam  is  'pharming',  where  a  hacker  puts  a

               malicious code on a computer to direct computer user to a fake website.

               Both phishing and pharming have been used for online identity theft or

               fraud. Victims' personal details may be used illegally to support crime or

               make online purchases.




                                        INFORMATION TECHNOLOGY IN

                                                        ENTERPRISE

                        ♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦




                       LEARNING OBJECTIVES

                       CHAPTER 13: INFORMATECHNOLOGY IN ENTERPRISE

                       At the end of this chapter, you should:

                          ✓ Be able to understand the role of information technology in


                              enterprise.

                          ✓ Be able to identify various tools and techniques for enterprise

                              information

                          ✓ management.


                          ✓ Be  able  to  identify  various  information  systems  used  in

                              enterprise.

                          ✓ Be able to identify various enterprise-wide technologies.

                          ✓ Be able to understand the disaster recovery process.






                                                             20
   15   16   17   18   19   20   21   22   23   24   25