Posts

Showing posts from March, 2018

SYSTEM FAILURE

Image
             SYSTEM FAILURE                    ➢System F ailure is the prolonged malfunction of a computer system. ➢System Failure can cause loss of hardware, software, data, or information.   the end ~

INFORMATION THEFT

Image
                                                                  INFORMATION  THEFT Information theft occurs when someone steals personal or confidential information . ➤ Obtaining enough information about an individual to perform fraudulent financial transaction is often related to identity theft. ➤ Identity theft is using someone else’s identity:     (a) to purchase goods or services     (b) to obtain new credit cards or bank loans     (c) illegally pretend to be as that individual                                                              EXAMPLES ➤An unethica...

HARDWARE THEFT AND VANDALISM

Image
            [HARDWARE THEFT @ VANDALISM]        ⧭ Hardware theft is the act of stealing     computer equipment           ⧭ Hardware vandalism is the act of defacing or destroying  computer equipment                      EXAMPLES ⧭ Hardware theft occurs when hardware is      stolen from an individual or from a    business, school, or other organization. ⧭Mobile devices are also at risk tohardware  theft because the size and weight make them   easy to steal.

ANAUTHORIZED ACCESS & USE

Image
                • Unauthorized Access is the use of a   computer,network,without permission.    • Unauthorized Use is the use of a computer, or its data for unapproved or possibly                illegal activities                    EXAMPLES         • A company’s clerk is using her employer’s  personal computer without the employer’s knowledge.       •   An employee from the sales department   has tried to gain access to the computer   network system using the system   administrator password.       •  An employee using an organization's   computer to send a personal e-mail   messages.

TYPE OF MALWARE

Image
                                   ⧪ WORMS                                                                                                             • A program that copies itself repeatedly, for example in memory,   using up resources and possibly shutting down the computer,          device or network.                    ⧪ TROJAN HORSE                      •A program that hides within or looks like a legitimated program.  Unlike a virus or worm, a trojan hors...

MALWARE

Image
                    MALWARE @ MALICIOUS CODE     ➹Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises ➹Internet and network attacks that are exposed to security include       (a) Malware / Malicious Code ➹ Malware is malicious software, which are programs that act without a user’s knowledge and deliberately /purposely  alter the computer’s operations. ➹Types of Malware : *Computer viruses *Worms *Trojan Horses                                                                                                         ...

COMPUTER SECURITY RISKS

Image
                                                                TYPE                      OF                               SECURITY                     RISKS MALWARE/MALICIOUS CODE UNAUTHORIZED ACCESS AND USE HARDWARE THEFT @ AND VANDALISM SOFTWARE THEFT INFORMATION THEFT SYSTEM FAILURE 

COMPUTER SECURITY RISKS

Image
                                                                   COMPUTER SECURITY RISKS                         A computer security risk is any action that could cause a loss of or damage to computer hardware, software, data, information, or processing capabilit y.     
Image
   AREA OF COMPUTER ETHICS                                                                                                                                                                                                                                                      

COMPUTER ETHICS

Image
                                                                                                                    DEFINITION                COMPUTER ETHICS     ⧭ The moral guidelines that oversee the use of computers and       information systems.                           AREA OF COMPUTER ETHICS...

NETIQUETTE

Image
          § Netiquette includes rules for all aspects of the Internet services, including:             •The World Wide Web              •E-mail              •Instant messaging                                                                  •Chat rooms                                                                 •Newsgroups and message boards.                                                     ...

NETIQUETTE

Image
                         • Netiquette  is the code of acceptable behaviors users should  follow while on the Internet . OR                                                           • Netiquette is the code of acceptable Internet behavior .                                                                                                                                                   ...