3.2.1 computer security risks
description
Transcript of 3.2.1 computer security risks
![Page 1: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/1.jpg)
4.0 COMPUTER ETHICS 4.0 COMPUTER ETHICS AND SECURITYAND SECURITY
4.2 Computer Security4.2 Computer Security
4.2.1 Computer Security Risks4.2.1 Computer Security Risks
![Page 2: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/2.jpg)
2
LEARNING OUTCOMES:LEARNING OUTCOMES:
At the end of this topic, students should be able to:
Define computer security risks. Identify types of security risks.
![Page 3: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/3.jpg)
Computer Security Risks Computer Security Risks
Definition : Definition : is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
3
DEFINITIONDEFINITION
![Page 4: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/4.jpg)
Types of Computer Security RisksTypes of Computer Security Risks
![Page 5: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/5.jpg)
5
Internet and network attackInternet and network attack
Hardware theftHardware theft
Information theftInformation theft
Unauthorized access and useUnauthorized access and use
Software theftSoftware theft
System failureSystem failure
Types of Computer Security RisksTypes of Computer Security Risks
![Page 6: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/6.jpg)
Internet and network attacksInternet and network attacks
• Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises.
![Page 7: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/7.jpg)
7
1. Malware1. Malware
2. Botnets2. Botnets
5. Spoofing5. Spoofing
4. Denial of service attacks4. Denial of service attacks
3. Back Doors3. Back Doors
Internet and Internet and network attacksnetwork attacks
![Page 8: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/8.jpg)
Malware (malicious software) – which are program that act without a user’s knowledge and deliberately alter the computer operation.
Type of malware:i. Computer virusesii. Wormsiii.Trojan Horsesiv.Rootkitv. Back doorvi.Spyware
MalwareMalware
![Page 9: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/9.jpg)
MalwareMalware
9
Symptoms MalwareSymptoms Malware
•• Operating system runs much slower than usual
• Available memory is less than expected
• Files become corrupted
• Screen displays unusual message or image
• Music or unusual sound plays randomly
• Existing programs and files disappear
![Page 10: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/10.jpg)
MalwareMalware
10
Symptoms MalwareSymptoms Malware
• Programs or files do not work properly
• Unknown programs or files mysteriously appear
• System properties change
• Operating system does not start up
• Operating system shuts down unexpectedly
![Page 11: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/11.jpg)
11
1. Worm1. Worm
Definition : Worm is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.
MalwareMalware
![Page 12: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/12.jpg)
12
22. Computer Virus. Computer Virus
Definition : Computer virus is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
MalwareMalware
![Page 13: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/13.jpg)
13
22. Computer Virus. Computer Virus
it can spread throughout and may damage files and system software, including the operating system.
MalwareMalware
![Page 14: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/14.jpg)
14
33. Trojan horse. Trojan horse
Internet and network attacks
Definition : Trojan horse is a program that hides within or looks like a legitimate program. It does not replicate itself to other computers.
MalwareMalware
![Page 15: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/15.jpg)
15
33. Trojan horse. Trojan horse
Internet and network attacks
it can spread throughout and may damage files and system software, including the operating system.
MalwareMalware
![Page 16: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/16.jpg)
16
44. Rootkit. Rootkit
Internet and network attacks
Definition : Is a program that hides in a computer and allows someone from a remote location to take full control of the computer.
The rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer
MalwareMalware
![Page 17: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/17.jpg)
17
5. Spyware & Adware. Spyware & Adware
Internet and network attacks
Spyware is a program placed on a computer without the users knowledge that secretly collects information about the user.
Adware is a program that displays an online advertisement in a banner or pop-up window on web pages, e-mail messages or other internet services
MalwareMalware
![Page 18: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/18.jpg)
Definition :
a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
BotnetsBotnets
![Page 19: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/19.jpg)
Definition :
A program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
Back DoorBack Door
![Page 20: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/20.jpg)
Definition :
Denial of service attacks or DoS attack, is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
Denial of Service Attacks Denial of Service Attacks
![Page 21: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/21.jpg)
Definition :
A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
SpoofingSpoofing
![Page 22: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/22.jpg)
Unauthorized Access and UseUnauthorized Access and Use
Unauthorized accessUnauthorized accessThe use of a computer or network without permission.
Unauthorized useUnauthorized useThe use of a computer or its data for unapproved or possibly illegal activities.
![Page 23: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/23.jpg)
Hardware Theft and VandalismHardware Theft and Vandalism
Hardware theftHardware theftIs the act of stealing computer equipment.
Hardware vandalismHardware vandalismThe act of defacing or destroying computer equipment.
![Page 24: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/24.jpg)
Software TheftSoftware Theft
![Page 25: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/25.jpg)
Information TheftInformation Theft
Occurs when someone steals personal or confidential information. If stolen, the loss of information can cause as much damage as (if not more than) hardware or software theft.
![Page 26: 3.2.1 computer security risks](https://reader034.fdocuments.in/reader034/viewer/2022042613/546c45f6af795971298b4e98/html5/thumbnails/26.jpg)
System FailureSystem Failure
A system failure is the prolonged malfunction of a computerA variety of factors can lead to system failure, including:
Aging hardwareNatural disastersElectrical power problems
Noise, undervoltages, and overvoltagesErrors in computer programs