We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12
COMPUTER SECURITY
DEFINE THE FOLLOWING TERMS:
1. COMPUTER SECURITY 2. DATA SECURITY 3. PRIVATE DATA 4. CONFIDENTIAL DATA 5. DATA CONTROL 6. THREATS Computer Security: Computer security refers to the protection of computer systems and networks from unauthorized access, cyberattacks, or damage that could disrupt their operation or compromise the confidentiality, integrity, or availability of data. It involves implementing various measures such as firewalls, antivirus software, encryption, and user authentication. Data Security: Data security is the practice of protecting digital information from unauthorized access, corruption, or theft throughout its lifecycle. This includes the use of encryption, access controls, and secure data storage solutions to prevent data breaches and ensure data privacy. Private Data: Private data, also known as personal data, includes information that can identify an individual, such as names, addresses, phone numbers, email addresses, and other details unique to a person. This type of data is subject to strict privacy laws and regulations, which aim to protect individuals' personal information from misuse. Confidential Data: Confidential data is sensitive information that is intended to be kept private and only accessible to authorized individuals or entities. Examples include trade secrets, business plans, financial records, and other proprietary information that, if disclosed, could negatively impact an organization or individual. Data Control: Data control refers to the policies, practices, and mechanisms in place to manage the collection, storage, sharing, and use of data within an organization. It includes enforcing data privacy, ensuring data integrity, and limiting access based on user roles to maintain data accuracy and prevent unauthorized access. Threats (Risks) are potential dangers or risks that could exploit vulnerabilities in a system, network, or application to cause harm. Threats may lead to unauthorized access, data loss, financial loss, or disruption of operations. These can originate from various sources, including external attackers, internal users, system flaws, or environmental factors, and can be classified as intentional (e.g., cyberattacks) or unintentional (e.g., accidental data leaks).Common types of threats include malware, phishing attacks, insider threats, social engineering, and natural disasters, among others. Addressing these threats involves identifying potential risks and implementing security measures to prevent, detect, or mitigate their impact. Viruses: A virus is a type of malicious software (malware) that attaches itself to a legitimate program or file. Once the infected file or program is executed, the virus replicates and spreads to other files or programs on the system, potentially causing damage or slowing down performance. Viruses often require human action to spread, such as opening an infected file or program. Trojan Horse: A Trojan horse, or simply "Trojan," is malware disguised as legitimate software or embedded within legitimate- looking files. Unlike viruses and worms, a Trojan does not replicate itself but instead relies on users to install or activate it, often unknowingly. Once active, Trojans can create backdoors, steal data, or grant unauthorized access to the attacker, allowing them to control the system remotely. Worms: Worms are standalone malware that self-replicate and spread without the need for a host file or human action. They exploit network vulnerabilities to infect other devices, often causing widespread damage across a network. Unlike viruses, worms can spread automatically by scanning for other vulnerable systems to infect, consuming network resources and potentially causing network slowdowns or failures. In summary: Virus: Attaches to files, spreads with user action, can cause damage. Trojan Horse: Disguised as legitimate software, does not replicate, grants unauthorized access. Worm: Self-replicates, spreads automatically, often affects networks.