SYSTEM FAILURE ➢System F ailure is the prolonged malfunction of a computer system. ➢System Failure can cause loss of hardware, software, data, or information. the end ~
INFORMATION THEFT Information theft occurs when someone steals personal or confidential information . ➤ Obtaining enough information about an individual to perform fraudulent financial transaction is often related to identity theft. ➤ Identity theft is using someone else’s identity: (a) to purchase goods or services (b) to obtain new credit cards or bank loans (c) illegally pretend to be as that individual EXAMPLES ➤An unethica...
[HARDWARE THEFT @ VANDALISM] ⧭ Hardware theft is the act of stealing computer equipment ⧭ Hardware vandalism is the act of defacing or destroying computer equipment EXAMPLES ⧭ Hardware theft occurs when hardware is stolen from an individual or from a business, school, or other organization. ⧭Mobile devices are also at risk tohardware theft because the size and weight make them easy to steal.
• Unauthorized Access is the use of a computer,network,without permission. • Unauthorized Use is the use of a computer, or its data for unapproved or possibly illegal activities EXAMPLES • A company’s clerk is using her employer’s personal computer without the employer’s knowledge. • An employee from the sales department has tried to gain access to the computer network system using the system administrator password. • An employee using an organization's computer to send a personal e-mail messages.
⧪ WORMS • A program that copies itself repeatedly, for example in memory, using up resources and possibly shutting down the computer, device or network. ⧪ TROJAN HORSE •A program that hides within or looks like a legitimated program. Unlike a virus or worm, a trojan hors...
MALWARE @ MALICIOUS CODE ➹Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises ➹Internet and network attacks that are exposed to security include (a) Malware / Malicious Code ➹ Malware is malicious software, which are programs that act without a user’s knowledge and deliberately /purposely alter the computer’s operations. ➹Types of Malware : *Computer viruses *Worms *Trojan Horses ...
TYPE OF SECURITY RISKS MALWARE/MALICIOUS CODE UNAUTHORIZED ACCESS AND USE HARDWARE THEFT @ AND VANDALISM SOFTWARE THEFT INFORMATION THEFT SYSTEM FAILURE
COMPUTER SECURITY RISKS A computer security risk is any action that could cause a loss of or damage to computer hardware, software, data, information, or processing capabilit y.
§ Netiquette includes rules for all aspects of the Internet services, including: •The World Wide Web •E-mail •Instant messaging •Chat rooms •Newsgroups and message boards. ...
• Netiquette is the code of acceptable behaviors users should follow while on the Internet . OR • Netiquette is the code of acceptable Internet behavior . ...