Page 20 - 6485
P. 20
legitimate or not, they should contact bank before responding. Banks will
also want to know about fraudulent emails.
Another common scam is 'pharming', where a hacker puts a
malicious code on a computer to direct computer user to a fake website.
Both phishing and pharming have been used for online identity theft or
fraud. Victims' personal details may be used illegally to support crime or
make online purchases.
INFORMATION TECHNOLOGY IN
ENTERPRISE
♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦♦
LEARNING OBJECTIVES
CHAPTER 13: INFORMATECHNOLOGY IN ENTERPRISE
At the end of this chapter, you should:
✓ Be able to understand the role of information technology in
enterprise.
✓ Be able to identify various tools and techniques for enterprise
information
✓ management.
✓ Be able to identify various information systems used in
enterprise.
✓ Be able to identify various enterprise-wide technologies.
✓ Be able to understand the disaster recovery process.
20