COMPUTER SECURITY RISKS
Computer security risks define as any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability.
Other intruders indicate some evidence of their presence either by leaving a message or by deliberately altering or damaging data. Any illegal act involving a computer generally is referred to as a computer crime. Cybercrime refers to online or Internet-based illegal acts. Software used by cybercriminals sometimes is called crimeware.
- Hacker, refers to someone who accesses a computer or network illegally. Some hackers claim the intent of their security breaches is to improve security.
- Cracker also is someone who accesses a computer or network illegally but has the intent of. destroying data, stealing information, or other malicious action
- Script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Often use prewritten hacking and cracking programs to break into computers.
- Corporate spies have excellent computer and networking skills.
- hired to break into a specific computer and steal its proprietary data and information.
- to help identify security risks in their own organization
- Unethical employees may break into their employers’ computers for a variety of reasons:
- want to exploit a security weakness,
-disgruntled employees may want revenge.
-They will send an organization a threatening e-mail message indicating they will expose confidential information if they are not paid a sum of money.
Malicious code
Malicious code is code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools.
Malicious code can either activate itself or be like a virus requiring user to perform an action, such as clicking on something or opening an email attachment.
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. It may damage files and system software, including the operating system.
Almost all viruses are attached to an executable file. The virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. A computer virus by sharing infecting files or sending emails with viruses as attachments in the email.
Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.
Examples: Melissa, Tequila, Cascade, Invader
Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.
Examples: Melissa, Tequila, Cascade, Invader
Comments
Post a Comment