Thursday 8 March 2018

Types of Computer Security Risk

What is computer risk??


Any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability.



Perpetrators of cybercrime and other intrusions fall into seven basic categories:


Cracker


    
Hacker









Corporate Spies






Script Kiddie
 
Unethical employees

Cyber Extortionist

Cyber Terrorist





There six of computer security risk:

Malicious Code
Unauthorized Access & Use
Software Theft
Hardware Theft
Information Theft
System Failure



MALICIOUS CODE
    •is code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools.
      

     TROJAN HORSE

            •Similar to virus and worm but it does not spread or reproduce.
            •It looks similar to a software but will actually damage once installed or run it.
            •Can cause severe damage such as deleting file

                                                                            WORM

            •Worm is similar to virus but spreads without human action.
            •It gets multiplied or copied itself into hundred or thousands in number
            •Spread itself into other computers through mail or address box
          

     COMPUTER VIRUS

•Attached itself to a program or file which cannot spread without human action.
•When we run or open a file in which virus is present then it starts effecting and starts spreading.


UNAUTHORISED ACCESS & USE

Unauthorized access 
The use of a computer or network without permission.

                              •Unauthorized use 
The use of a computer or its data for unapproved or possibly illegal
activities.


                   SOFWARE THEFT

       •Software theft occurs when someone:
Steals software media
Intentionally erases programs
Illegally copies a program
Illegally registers and/or activates a program.



HARDWARE THEFT
Hardware theft is the act of stealing computer equipment.
Hardware vandalism is the act of defacing or destroying
computer equipment.
Companies, schools, and other organizations that house many computers, however, are at risk of hardware theft.


INFORMATION THEFT
Information theft occurs when
someone steals personal or
 confidential information.

If stolen, the loss of information
 can cause as much damage as
 (if not more than) hardware or
 software theft.

•An unethical company executive 
may steal or buy stolen 
information to learn about a 
competitor.

A corrupt individual may steal 
credit card numbers to make 
fraudulent purchases.


SYSTEM FAILURE
A system failure is the
 prolonged malfunction of a
 computer

Can cause loss of 
hardware, software, data, 
or information.

These include aging 
hardware; naturaldisasters 
such as fires, floods, or
 hurricanes; random events 
such as electrical
 power  problems; and
 even errors in computer 
programs.

No comments:

Post a Comment

Cegah Covid-19