DEFINITION:
- any event or action that could cause a loss of damage to computer hardware, software, data, information or processing capability
TYPES OF COMPUTER SECURITY RISKS
1. MALICIOUS CODE
-COMPUTER VIRUS
- is code causing damage to a computer or system. It code not easily or solely controlled though the use of anti-virus tools.
DEFINITION: a computer virus is a potentially damaging computer program that effects of infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.
EXAMPLE: Melissa, Tequila, Cascade, Invader
-WORM
-copy itself repeatedly
*memory or on a network, using up resources and possibly shutting down the computer or the network
*spread from the computer to computer, but unlike a virus, it has the capability to travel without any human action
*it will causing web server, network servers and individual computers to stop responding
EXAMPLE: Jurusalem, Sobing, Nimda, Morris worm
TROJAN HORSE
-A program that hides within or looks like a legitimate program. it does not replicate itself to other computer.
-appear to be useful software but will actually do damage once installed or run on your computer.
EXAMPLES: Netbus, Back Orifice, Subseven.
UNAUTHORIZED ACCESS AND USE
UNAUTHORIZED ACCESS
-the use of computer or network without permission
UNAUTHORIZED USE
-the use of a computer or its data for unapproved or possibly illegal activities.
A system failure is the prolonged malfunction of a computer
Can cause loss of hardware, software, data, or information.
These include aging hardware; natural disasters such as fires, floods, or hurricanes; random events such as electrical power problems; and even errors in computer programs.
*memory or on a network, using up resources and possibly shutting down the computer or the network
*spread from the computer to computer, but unlike a virus, it has the capability to travel without any human action
*it will causing web server, network servers and individual computers to stop responding
EXAMPLE: Jurusalem, Sobing, Nimda, Morris worm
TROJAN HORSE
-A program that hides within or looks like a legitimate program. it does not replicate itself to other computer.
-appear to be useful software but will actually do damage once installed or run on your computer.
EXAMPLES: Netbus, Back Orifice, Subseven.
UNAUTHORIZED ACCESS AND USE
UNAUTHORIZED ACCESS
-the use of computer or network without permission
UNAUTHORIZED USE
-the use of a computer or its data for unapproved or possibly illegal activities.
UNAUTHORIZED ACCESS AND USE
HARDWARE THEFT
-is the act of stealing computer equipment
-hardware vandalism is the act of defending or destroying computer equipment
-safeguard against Hardware Theft and vandalism:
1.physical access controls, such as locked doors and windows.
2. install alarm system in their building
2.SOFTWARE THEFT
-illegally copies a program occurs when software is stolen from software manufactures.
-illegally registers and/or activities a program involves users illegally obtaining registration numbers and/or activation codes
INFORMATION THEFT
- occur when someone steals personal or confidential information
-the loss of information can cause damage of hardware and software
-may steal credit card numbers to make fraudulent purchases.
SAFEGUARD AGAINST INFORMATION THEFT:
1. protecting information on computer located on an organization's premises.
2.to protect information on the internet and networks, organizations and individuals use a variety of encryption techniques.
SYSTEM FAILURE
Can cause loss of hardware, software, data, or information.
These include aging hardware; natural disasters such as fires, floods, or hurricanes; random events such as electrical power problems; and even errors in computer programs.
Safeguards against System failure
To protect against electrical power variations, use a surge protector.
A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.
No comments:
Post a Comment