- A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
- A cybercrime is an online or Internet-based illegal act.
- An online security service is a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities.
- Computer virus - Affects a computer negatively by altering the way the computer works.
- Worm - Copies itself repeatedly, using up resources and possibly shutting down the computer or network.
- Trojan Horse - A malicious program that hides within or looks like a legitimate program.
- Rootkit - Program that hides in a computer and allows someone from a remote location to take full control.
- An infected computer has one or more of the following symptoms: Files become corrupted, Available memory is less than expected, System properties change, Operating system shuts down unexpectedly.
- A botnet is a group of compromised computers connected to a network. A compromised computer is known as a zombie.
- A back door is a program or set of instructions in a program that allow users to bypass security controls.
- Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate.
- A firewall is hardware and/or software that protects a network's resources from intrusion.
Unauthorized access is the use of a computer or network without permission.
Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.
- Access controls define who can access a computer, when they can access it, and what actions they can take. i) User name ii) Password iii) CAPTCHA
- Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks
- Many areas use digital forensics : Law enforcement, Criminal prosecutors, Military intelligence, Insurance agencies.
Hardware theft is the act of stealing computer equipment.
Hardware vandalism is the act of defacing or destroying computer equipment.
- To help reduce the chances of theft, companies and schools use a variety of security measures : i) Alarm systems, ii) Cables to lock equipment, iii) Real time location system, iv) Physical access controls.
- Software theft occurs when someone : Steals software media, Illegally copies a program, Intentionally erases programs, Illegally registers and/or activates a program.
- A single-user license agreement typically contains the following conditions: i) Permitted to - Install the software on one computer. Make one copy of the software. Remove the software from your computer before giving it away or selling it.
- Some software requires product activation to function fully.
- Information theft occurs when someone steals personal or confidential information.
- Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.
- A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender.
- A system failure is the prolonged malfunction of a computer.
- A variety of factors can lead to system failure, including : Aging hardware, Natural disasters, Electrical power problems.
- Two ways to protect from system failures caused by electrical power variations include surge protectors and uninterruptable power supplies (UPS).
- A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. To back up a file means to make a copy of it
- Offsite backups are stored in a location separate from the computer site.
In additional to using firewalls, some safeguards improve security of wireless networks: A wireless access point should not broadcast an SSID, Change the default SSID, Use WPA or WPA2 security standards.
Ethics and Society
- Computer ethics are the moral guidelines that govern the use of computers and information systems.
- Information accuracy is a concern.
- Green computing involves reducing the electricity and environmental waste while using a computer.
- Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
- A cookie is a small text file that a Web server stores on your computer. Reasons for this web sites cookies are : i) Allow for personalization ii) Target advertisements iii) Store users passwords.
- Spam is an unsolicited e-mail message or newsgroup posting.
- E-mail filtering blocks e-mail messages from designated sources.
- Anti-spam programs attempt to remove spam before it reaches your inbox.
- Social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantages of trust and naivety.
- Employee monitoring involves the use of computers to observe, record, and review an employee's use of a computer.
- Content filtering is the process of restricting access to certain material on the Web.
- Web filtering software restricts access to specified Web sites.
No comments:
Post a Comment