What is computer risk??
Any
event or action that could cause a loss
of or damage to
computer hardware, software, data, information or processing capability.
Perpetrators
of cybercrime and other intrusions fall into seven basic categories:
 |
Cracker |
 |
Hacker
|
|
 |
Corporate Spies
Script Kiddie Unethical employees
Cyber Extortionist
Cyber Terrorist
There six of computer security risk:
Malicious Code
Unauthorized Access & Use
Software Theft
Hardware Theft
Information Theft
System Failure
MALICIOUS CODE
•is
code causing damage to a computer or system. It is code not easily or solely
controlled through the use of anti-virus tools.
TROJAN HORSE
•Similar to virus and worm but it does not spread or reproduce.
•It looks similar to a software but will actually damage once
installed or run it.
•Can cause severe damage such as deleting file
WORM
•Worm is similar to virus but spreads without human action.
•It gets multiplied or copied itself into hundred or thousands
in number
•Spread itself into other computers through mail or address box
COMPUTER VIRUS
•Attached itself to a program or file which cannot spread
without human action.
•When we run or open a file in which virus is present then it
starts effecting and starts spreading.
UNAUTHORISED ACCESS & USE
•Unauthorized
access
•The use of a computer or network without
permission.
•Unauthorized
use
•The use of a computer or its data for unapproved or
possibly illegal
activities.
SOFWARE THEFT
•Software theft occurs
when someone:
Steals software media
Intentionally erases programs
Illegally copies a program
Illegally registers and/or activates a program.
HARDWARE THEFT
•Hardware
theft is
the act of stealing computer equipment.
•Hardware
vandalism is
the act
of defacing or destroying
computer equipment.
•Companies, schools, and other
organizations that house many computers, however, are at risk of hardware
theft.
INFORMATION THEFT
•Information
theft occurs
when
someone steals personal or
confidential information.
•If stolen, the loss of information
can cause as much damage
as
(if not more than) hardware or
software theft.
•An unethical
company executive
may steal
or buy stolen
information to learn about a
competitor.
•A
corrupt individual may steal
credit
card numbers to make
fraudulent purchases.
SYSTEM FAILURE
•A system
failure is the
prolonged malfunction of a
computer
•Can cause loss of
hardware, software, data,
or information.
•These include aging
hardware; naturaldisasters
such
as fires, floods, or
hurricanes; random events
such as electrical
power problems; and
even errors in
computer
programs.
|
No comments:
Post a Comment