Computer Security Risks
Any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability.
Perpetrators of cybercrime and other intrusions fall into seven basic categories:
- Hacker
- Cracker
- Script kiddie
- Corporate spies(espionage)
- Unethical employees
- Cyber extortionist
- Cyberterrorist
Malicious code
code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools.
computer virus
A computer virus is a potentially damaging computer program that affects or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.

A program that copies itself repeatedly.For example in memory or on a network, using up resources and possibly shutting down the computer or network.

Trojan horse
A program that hides within or looks like a legitimate program. It does not replicate itself to other computers.Examples is Netbus, Back Orifice, Subseven, Beast.


Unauthorized access & use
Unauthorized access
-The use of a computer or network without permission.
Unauthorized use
-The use of a computer or its data for unapproved or possibly illegal activities.
Hardware theft
Act of stealing computer equipment.Hardware vandalism is the act of defacing or destroying computer equipment.
Safeguards against Hardware Theft and Vandalism
- Physical access controls, such as locked doors and windows
- Install alarm systems in their buildings
- Physical security devices such as cables that lock the equipment to a desk.
Software theft
Illegally copies a program occurs when software is stolen from software manufacturers. This type of theft, called piracy, is by far the most common form of software theft.
information theft
Someone steals personal or confidential information.
Safeguards against Information Theft
- Protecting information on computers located on an organization’s premises.
- To protect information on the internet and networks, organizations and individuals use a variety of encryption techniques.
- Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.
System failure
Prolonged malfunction of a computer.It can cause loss of hardware, software, data, or information.
Safeguards against System failure
- To protect against electrical power variations, use a surge protector.
- A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.
- For additional electrical protection, some users connect an uninterruptible power supply to the computer.
No comments:
Post a Comment