What is computer risk??
Any
event or action that could cause a loss
of or damage to
computer hardware, software, data, information or processing capability.
Perpetrators
of cybercrime and other intrusions fall into seven basic categories:
|  | 
| Cracker | 
    
 
| 
|  |  | Hacker 
 
 
 
 
 
 
 |  
 
 
 | 
|  | 
| Corporate Spies 
 
 
 
 
 
 Script Kiddie
 
 Unethical employees
 
 Cyber Extortionist
 
 Cyber Terrorist
 
 
 
 
 
 
There six of computer security risk: 
 
Malicious Code 
Unauthorized Access & Use 
Software Theft 
Hardware Theft 
Information Theft 
System Failure 
 
 
 
MALICIOUS CODE 
    •is
code causing damage to a computer or system. It is code not easily or solely
controlled through the use of anti-virus tools. 
       
 
     TROJAN HORSE 
 
            •Similar to virus and worm but it does not spread or reproduce. 
            •It looks similar to a software but will actually damage once
installed or run it. 
            •Can cause severe damage such as deleting file
 WORM
 
 
            •Worm is similar to virus but spreads without human action. 
            •It gets multiplied or copied itself into hundred or thousands
in number 
            •Spread itself into other computers through mail or address box 
 
     COMPUTER VIRUS 
 
•Attached itself to a program or file which cannot spread
without human action. 
•When we run or open a file in which virus is present then it
starts effecting and starts spreading. 
 
 
UNAUTHORISED ACCESS & USE
 •Unauthorized
access
 
•The use of a computer or network without
permission.
 •Unauthorized
use
 •The use of a computer or its data for unapproved or
possibly illegal
 activities.
 
                   SOFWARE THEFT
 •Software theft occurs
when someone:
 Steals software media
 Intentionally erases programs
 Illegally copies a program
 Illegally registers and/or activates a program.
 
 
 
 
HARDWARE THEFT 
•Hardware
theft is
the act of stealing computer equipment. 
•Hardware
vandalism is
the act
of defacing or destroying 
computer equipment. 
•Companies, schools, and other
organizations that house many computers, however, are at risk of hardware
theft. 
 
 
INFORMATION THEFT 
•Information
theft occurs
when 
someone steals personal or 
 confidential information. 
 
•If stolen, the loss of information 
 can cause as much damage
as 
 (if not more than) hardware or 
 software theft. 
 
•An unethical
company executive  
may steal
or buy stolen  
information to learn about a  
competitor. 
 
•A
corrupt individual may steal  
credit
card numbers to make  
fraudulent purchases. 
 
 
SYSTEM FAILURE 
•A system
failure is the 
 prolonged malfunction of a 
 computer 
 
•Can cause loss of  
hardware, software, data,  
or information. 
 
•These include aging  
hardware; naturaldisasters  
such
as fires, floods, or 
 hurricanes; random events  
such as electrical 
 power  problems; and 
 even errors in
computer  
programs. | 
 
 
 
No comments:
Post a Comment