Please enable JavaScript.
Coggle requires JavaScript to display documents.
COMPUTER ISSUES, HARANI A/P GANESAN 012020021525 - Coggle Diagram
COMPUTER ISSUES
Prevention methods in computer security
firewall-Security system consisting of hardware and/or software that prevents unauthorized intrusion
Never start a computer with removable media inserted
Install an antivirus program on all of your computers
Never open an e-mail attachment unless you are expecting it and it is from a trusted source
If the antivirus program flags an e-mail attachment as infected, delete the attachment immediately
Intrusion detection softwareanalyzes network traffic, assesses system vulnerabilities, and identifies intrusions and suspicious behavior
Access control defines who can access computer and what actions they can take
Audit trail records access attempts
Unauthorized Access and Use
Hardware Theft and Vandalism
Software Theft
Information Theft
control spam
spyware, adware, and spam
Risks in computer security
Virus is a potentially damaging computer program
Worm copies itself repeatedly, using up resources and possibly shutting down computer or network
Trojan horse hides within or looks like legitimate program until triggered
Payload (destructive event) that is delivered
PERPETRATORS OF CYBERCRIME
Hacker
Someone who access a computer or network illegally.
Some hackers claim the intent of their security breaches is to improve security.
Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive.
hackers would often create and distribute small sections of code called patches to fix the problem.
Cracker
Someone who access a computer or network illegally but has destroying data, stealing information or other malicious action.
Have advanced computer and network skills.
Some security crackers end up using their powers for good, providing penetration testing services or otherwise making efforts on the side of the angels.
Cyberterrorist
Someone who uses the internet or network to destroy or damage computers for political reasons.
The cyberterrorist might target the nation’s air traffic control system or a telecommunication infrastructure.
Cyberterrorism usually require a team of highly skilled, individuals, million of dollars and several years of planning.
Corporate Spies
Corporate spies have excellent computer and networking skills.
HARANI A/P GANESAN 012020021525