Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 9 - Coggle Diagram
CHAPTER 9
Forms of computer crime
- Malicious Programs- malware.
- Designed by crackers, computer criminals to damage a computer system
3 common programs:
- Viruses.
- Worms. -
- Trojan horse.
- Cyber Crime:
- Denial of service.
- Rogue Wi-fi hotspots.
- Data manipulation
- Internet scams:
operation to trick someone into providing personal information.
- Identify theft.
- Cyber-bullying.
- Phishing.
Types:
- chain letter.
- auction prize.
- advance fee loans.
Computer crime:
- malicious programs.
- Dos.
- Rogue Wi-fi hotspots.
-Data manipulation.
- Identify theft.
- Internet scams.
-Cyberbullying.
-
-
Measures to protect computer security:
- Restricting access.
- Encrypting data.
- Anticipating disasters.
- Preventing data loss.
Restricting access:
- biometric scanning.
- passwords.
- dictionary attack
-
-
Anticipating disasters
- Physical security protects hardware.
- Data security protects software.
- Disaster recovery plan describes ways.
- Preventing data loss.
- Frequent backups.
- Redundant data storage
-
History files & temporary internet files:
- locations/addresses.
- Saved files.
- Offers quick re-display.
-
Large databases:
- Big data.
- Data collectors.
- Information resellers.
- Personal information.
- Freedom of information Act
-
-
Privacy modes:
- incognito mode.
- private browsing.
Privacy threats:
- web bugs.
- spyware.
- computer monitoring software.
- anti-spyware programs
-
Plagiarism: representing some other person's work without giving credit to the original person's work
Ergonomics: applied science devoted to incorporating comfort, efficiency & safety.
Health concerns of computer use:
- Repetitive strain injury (RSI)
- Computer vision syndrome (CV)