0% found this document useful (0 votes)
62 views3 pages

Computer Security and Safety, Ethics, and Privacy

This document discusses seven categories of cybercrime: hackers, script kiddies, crackers, cyberterrorists, cyber extortionists, corporate spies, and unethical employees. It also covers computer security risks like viruses, Trojan horses, worms, rootkits, and botnets. Common types of attacks include denial of service attacks, back doors, spoofing, and unauthorized access and use. The document also discusses identifying and authenticating users, digital forensics, health concerns of computer use, and software and information theft.

Uploaded by

premsbylowi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views3 pages

Computer Security and Safety, Ethics, and Privacy

This document discusses seven categories of cybercrime: hackers, script kiddies, crackers, cyberterrorists, cyber extortionists, corporate spies, and unethical employees. It also covers computer security risks like viruses, Trojan horses, worms, rootkits, and botnets. Common types of attacks include denial of service attacks, back doors, spoofing, and unauthorized access and use. The document also discusses identifying and authenticating users, digital forensics, health concerns of computer use, and software and information theft.

Uploaded by

premsbylowi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Computer Security and someone who uses Email as a

vehicle for extortion


Safety, Ethics, and unethical employee
Privacy Exploits a security weakness, seeks
financial gain from selling
confidential information or take
revenge
Computer Security Risks
corporate spy
• Any event or action that could cause
a loss of or damage to computer practice known as corporate
hardware, software, data, espionage, to gain a Competitive
information, or processing capability advantage
• Maybe accidental however mostly
are
• Merely access data, information, or Internet and Network Attacks
programs on the computer
• Maybe for leaving a message or by Computer Viruses
deliberately altering or damaging affects, or infects, a computer
data negatively by altering the way the
computer works without the user’s
knowledge or permission.
Seven Basic Categories of
Trojan Horses
Cybercrime
hides within or looks like a legitimate
Hacker
program.
someone who accesses a computer
Worms
or network illegally
copies itself repeatedly, for example
script kiddie
in memory or on a network, using up
as the same intent as a cracker but resources and possibly shutting
does not have the technical skills down the computer or network.
and knowledge
Rootkits
cracker
hides in a computer and allows
Accesses a computer or network someone from a remote location to
illegally but has the intent of take full control of the computer.
destroying data, stealing information,
Botnets
or other malicious action
a group of compromised computers
Cyberterrorist
connected to a network such as the
someone who uses the Internet or Internet that are used as part of a
network to destroy or damage network that attacks other networks,
computers for political reasons usually for nefarious purposes.

cyber extortionist Zombie


an assault whose purpose is to The use of a computer or its data for
disrupt computer unapproved or possibly illegal
activities.
access to an Internet service such
as the Web or e-mail
Denial of Service Attacks Identifying and Authenticating Users
an assault whose purpose is to Access control
disrupt computer access to an
Internet service such as the Web or a security measure that defines who
e-mail can access a computer, when they
can access it, and what actions they
Back Doors can take while accessing the
computer
a program or set of instructions in a
program that allow users to bypass audit trail
security controls when accessing a
program, computer, or network the computer should maintain an
audit trail that records in a file both
Spoofing successful and unsuccessful access
attempts.
a technique intruders use to make
their network or Internet
transmission appear legitimate to a
victim computer or network. Usernames and Passwords

Firewalls User Name, or User ID

hardware and/or software that A unique combination of characters,


protects a network’s resources from such as letters of the alphabet or
intrusion by users on another numbers, that identifies one specific
network user.

Intrusion Detection Software Password

Automatically analyzes all network A private combination of characters


traffic, assesses system associated with the user name that
vulnerabilities, identifies any allows access to certain computer
unauthorized access, and notifies resources.
network administrators

Possessed Objects & Biometric


Unauthorized Access and Use Devices

Unauthorized Access Possessed Objects

The use of a computer or network Any item that you must carry to gain
without permission. access to a computer or computer
facility. A personal identification
Unauthorized Use number (PIN) is a numeric
password, either assigned by a • involves the examination of
company or selected by a user. computer media, programs, data
and log files on computers, servers,
Biometric Devices
and networks
authenticates a person’s identity by • digital forensics examiner must have
translating a personal characteristic, knowledge of the law, technical
such as a fingerprint, into a digital experience with many types of
code hardware and software products,
superior communication skills,
Hardware Theft and Vandalism familiarity with corporate structures
Hardware Theft and policies, a willingness to learn
and update skills, and a knack for
The act of stealing computer problem solving.
equipment.
Hardware Vandalism
Health Concerns of Computer Use
The act of defacing or destroying
computer equipment. A repetitive strain injury (RSI) is an injury or
disorder of the muscles, nerves, tendons,
ligaments, and joints. Computer-related
Software & Information Theft RSIs include tendonitis and carpal tunnel
syndrome.
Software theft
Computer Addiction
Occurs when someone steals
• Craves computer time
software media, intentionally erases
• Irritable when not at the computer
programs, illegally copies a program,
or illegally registers and/or activates • Overjoyed when at the computer
a program. • Unable to stop computer activity
• Neglects family and friends
Information Theft • Problems at work or school
Occurs when someone steals
personal or confidential information.

Digital Forensics

• computer forensics, network


forensics, or cyber forensics, is the
discovery, collection, and analysis of
evidence found on computers and
networks.
• Used in law enforcement, criminal
prosecutors, military Intelligence,
insurance agencies, and information
security departments in the private
sector

You might also like