Please enable JavaScript.
Coggle requires JavaScript to display documents.
Introduction To Security, Various threats to computer security, Risk of…
-
-
-
-
-
-
- Computer are also threatened by natural or environmental disaster.
- At home, stores, offices and also automobiles
- Examples of natural or environment disasters is flood, fire, earthquakes, storms and tornados, excessive heat and inadequate power supply
-
-
- Method for computing passwords
-
- kind of harmful computer code designed to create system vulnerabilities leading to back door
- other potential damages to files and computing systems
-
-
-
-
- Effect is caused by an agent, with the intention to cause damage
- Various kinds of malicious code is include virus, trojan horse, worm and others
- A source of threat to security in computer. It is defined as anauthorized access to the computer system by a hacker
- Hackers are person who leans about computer in detail
- Hacker can use a modem or cable to hack the targeted computers.
-
- computer is used to steal money, goods, information and resources.
- Stealing of computer, especially notebook and PDAs
Breaking into a computer to obtain confidential information
- Example: stealing an organization's proprietary information, such as research and development information.
A form of information theft where personal information is stolen for the purpose of taking over someone identity.
-
- A primary step pf computer attack
- Hacker surveys a network and collects data for a future attack
- Eavesdropping program that monitors information travelling over network
- Pretending to be someone else
- Attempt to access another user account
or network device through improper means
- implemented using brute-force attack (repeated attempts to identify users password)
- Hacker have access to network packets that
come across a network
- Type of social engineering attack that involves using email or other types of messages in an attempt to trick others into providing sensitive information
- Implemented by a hacker as a means of denying a service
- normally available to a user or organization
- crashing or slowing it down to the point that it is unusable
- Use attack method similar to standard.
- DoS attack but operates on a much large scale
- To execute a particular unwanted function on the user workstation
- To look like something else that in fact is an attack tool
- To spread itself, relying on security failures
-
- Also called high level formatting, a boot sector is created and a file system is set up on the disk
- A standard format can only be performed after a low level format has been completed
- The surface of the dick is marked with sector markers to indicate where data will be stored physically on the disk, and tracks are created.
- Low level formatting is most often performed at the factory after the hard drive is built.