Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 1 (Goals of Security (Integrity=Protecting information from being…
Chapter 1
-
-
Malicious Code
-Refers to a broad category of program that can cause damage or undesireable effects to comp or network
-Potential damage can include modifying,destroying or stealing data,gaining or allowing unauthorised access to a system,bringing up unwanted screens,and executing functions that a user never intended.
-Comp viruses are still the most common form of malicious code
-
-
-
-
-
-
-
-
-
Theft
-Data theft is the act of stealing information stored on computers, servers,or other devices from an unknowing victim with the intent to compromise privacy or obtain confidential information
-Growing problem for individual computer users as well as large corporations and organization
-
External Threats
-come from amateurs or skilled attackers(outside) can exploit vulnerabilities in network or computing devices,or use social engineering to gain access
-They do not have authorized access to the comp sys or network
Internal Threats
-Occur when someone has authorized access to the network with either an account on a server or physical accesses to the network
-This could be a disgruntled employee,an opportunistic employee,or unhappy past employee whose access is still active.
Unstructured Threats
-Consists inexperienced individuals using hacking tools
-Even unstructured threats that are only executed with the intent of testing&challenging a hacker's skill can still damage to a company
Structured threats
-Structured threats come from hacker that are more highly motivated &technically competent
-These groups are often involved with the major fraud and theft cases reported to law enforcement agencies.
Cyber Security=Practice of protecting information&data from outside sources on the internet.
-Provide protection for networks,servers,intranets& comp sys
-Ensures that only authorized people have access to that information.
Information Security=Protecting information&information sys from unauthorized use,asses,modification or removal.