A computer security risk is any event or action that could cause a
loss of or damage to computer hardware, software, data, information, or
processing capability.
A cybercrime is an online or Internet-based illegal act like :-
- · Hacker-Someone who access a computer illegally.
- · Cracker- Has intention of destroying data, stealing information
- · Script kiddies- Same intention with cracker but does not have skills to use prewritten hacking program
- · Corporate Spies- Someone who is hired to break into specific computer to steal its property data
- ·
- · Unethical Employees- Someone break into their employee computer for various reason. Example – feel financial gain from selling
- · Cyber extortionist- Someone who uses email as a vehicle for extorts.
- · Cyber terrorists- Someone use Internet/network/to destroy or damage computers for political reason.
An online security service is a Web site that evaluates your computer
to check for Internet and e-mail vulnerabilities.
A botnet is a group of compromised computers connected to a
network.
A compromised computer is
known as a zombie.
A denial of service attack (DoS
attack) disrupts computer access to Internet services.
Distributed DoS (DDoS)
:-
A back door is a program or set of instructions in a program that
allow users to bypass security controls.
Spoofing
is a technique intruders use to make their network or
Internet transmission appear legitimate.
A firewall is
hardware and/or software that protects a network’s resources from intrusion.
Organizations
take several measures to help prevent unauthorized access and use :-
· Acceptable
use policy
· Disable
file and printer sharing
· Firewalls
· Intrusion
detection software
Access controls define who
can access a computer, when they can access it, and what actions they can take.
Two-phase processes called
identification and authentication :-
- · User name
- · Password
- · Passphrase
- · CAPTCHA
A biometric device authenticates a person’s
identity by translating a personal characteristic into a digital code that is
compared with a digital code in a computer.
Digital forensics is the discovery,
collection, and analysis of evidence found on computers and networks.
Information theft occurs when someone steals personal or confidential
information.
Encryption is a process of converting readable data into
unreadable characters to prevent unauthorized access.
A digital signature is an encrypted code that a
person, Web site, or organization attaches to an electronic message to verify
the identity of the sender.
Often used to ensure that an impostor is not
participating in an Internet transaction.
Web browsers and Web sites
use encryption techniques
Two ways to protect from
system failures caused by electrical power variations include :-
- · surge protectors
- · uninterruptable power supplies (UPS)
A backup is a duplicate of a file, program, or disk that can
be used if the original is lost, damaged, or destroyed. To
back up a file means to make a
copy of it.
Offsite backups are stored in a location separate from
the computer site.
Green computing involves reducing the
electricity and environmental waste while using a computer.
Information privacy refers to the right of
individuals and companies to deny or restrict the collection and use of
information about them.
Huge databases store data online. It is important to safeguard
your information.
Spam is an unsolicited e-mail message or newsgroup posting. E-mail filtering blocks. E-mail messages
from designated sources.
Anti-spam
programs attempt to
remove spam before it reaches your inbox.
Please re-check the definition for hackers and crackers
ReplyDeleteThanks miss
ReplyDelete