Please enable JavaScript.
Coggle requires JavaScript to display documents.
Protecting Information thrthtrht (Computer Security Risk (Internet &…
Protecting Information
Computer Security Risk
Internet & network access
Virus attack
Unauthorized access and use
Intercepting wireless communications
Hardware theft
Stolen computer
System failure
Lightning strike
Information theft
Stolen identity
Software theft
Illegal copying
Risk associated with IT
Spyware
Software that secretly gathers information
about users while they browse the Web
Prevent: Antivirus/antispyware
Phishing
Sending fraudulent emails appearing to
come from legitimate sources
Emails direct recipients to false websites
to capture private information
Keystroke loggers
Monitor and record keystrokes
Used by companies to track employees'
use of email and the internet
Prevent: Antivirus/antispyware
Computer fraud
Unauthorized use of computer data for personal gain
Denial of service attacks
Identity theft and software piracy
Distributing child pornography
Email spamming
Writing/spreading malicious code
Fault-tolerant systems
Ensure availability in the event of a system failure
by using a combination of hardware and software
Uninterruptible power supply (UPS)
Redundant array of independent disks (RAID)
Aspects of Computer & Network Security
Confidentiality
Integrity
Availability
Types of Security Threats - Intentional
Virus
Consists of self-multiply program code
that is triggered by a specific time or event
Worms
Independent programs that can spread themselves
without having to be attached to a host program
Trojan program
Contains code intended to disrupt
a computer, network or website
Backdoor
Enables the designer to bypass security and
sneak back into the system to access programs
Denial-of-service attacks(DoS)
Floods a network or server with service requests
to prevent legitimate user's access to the system
Social engineering
Using people skills to trick others
into revealing private information
Types of Security Threats - Unintentional
Aging hardware
Natural disaster
Electrical power problems
Errors in computer programs