Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 7 COMPUTER SECURITY & ETHICS - Coggle Diagram
CHAPTER 7
COMPUTER SECURITY & ETHICS
What is a computer security risk
Events or action that causes loss or damage to computer hardware,software, data, information and processing capabilities
Any illegal act involving a computer is referred to
computer crime
Cybercrime
refers to online or internet-based illegal act
TOPICS
Computer Security Risks
Internet and Network Attacks
7 categories of cyber crime
HACKER
someone who accesses a computer or network illegally
CRACKER
access computer or network illegally but intent of destroying data, stealing information or other information
CORPORATE SPIES
some have excellent computer and newt working skills
SCRIPT KIDDIE
same intent as cracker but does not have technical skills and knowledge
CYBER EXTORTIONIST
someone who uses e-mail as a vehicle for extortion
UNETHICAL EMPLOYEES
may break into employers computer for variety of reasons
CYBER TERRORIST
someone who uses the internet to destroy or damage computer for political reasons
INTERNET AND NETWORK ATTACKS
WORM
copies itself repeatedly using resources and possibly shutting down computer or network
TROJAN HORSES
hides within or looks legitimate program until triggered
does not replicate itself on other computers
VIRUSES
potentially damaging computer program
can spread and damage files
What is antivirus program
identifies and remove computer viruses
most also protect against worms and trojan horses