Computer Security Risks

Today, people rely on computers to create,
store, and manage critical information. Thus, it
is important that computers and the data they
store are accessible and available when needed.
It also is crucial that users take measures to
protect their computers and data from loss,
damage, and misuse. For example, organizations
must ensure that sensitive data and information
such as credit records, employee and customer
data, and purchase information is secure. Home
users must ensure that their credit card number
is secure when they use it for online purchases.
A computer security risk is any event or
action that could cause a loss of or damage to
computer hardware, software, data, information,
or processing capability. While some breaches
to computer security are accidental, many are
intentional. Some intruders do no damage; they
merely access data, information, or programs
on the computer before logging off. Other
intruders indicate some evidence of their presence
either by leaving a message or by deliberately
altering or damaging data.
An intentional breach of computer security
often involves a deliberate act that is against
the law. Any illegal act involving a computer
generally is referred to as a computer crime.
The term cybercrime refers to online or
Internet-based illegal acts. Software used by
cybercriminals sometimes is called crimeware.
Today, cybercrime is one of the FBI’s top three
priorities.
Perpetrators of cybercrime and other intrusions
fall into seven basic categories: hacker,
cracker, script kiddie, corporate spy, unethical
employee, cyberextortionist, and cyberterrorist.
• The term hacker, although originally a
com plimentary word for a computer
enthusiast, now has a derogatory meaning
and refers to someone who accesses a
computer or network illegally. Some hackers
claim the intent of their security breaches is
to improve security.
• A cracker also is someone who accesses
a computer or network illegally but has
the intent of destroying data, stealing
information, or other malicious action.
Both hackers and crackers have advanced
computer and network skills.
• A script kiddie has the same intent as a
cracker but does not have the technical skills
and knowledge. Script kiddies often use
prewritten hacking and cracking programs
to break into computers.
• Some corporate spies have excellent
computer and networking skills and are
hired to break into a specific computer and
steal its proprietary data and information, or
to help identify security risks in their own
organization. Unscrupulous companies
hire corporate spies, a practice known as
corporate espionage, to gain a competitive
advantage.
• Unethical employees may break into their
employers’ computers for a variety of reasons.
Some simply want to exploit a security
weakness. Others seek financial gains from
selling confidential information. Disgruntled
employees may want revenge.
• A cyberextortionist is someone who uses
e-mail as a vehicle for extortion. These
perpetrators send an organization a
threatening e-mail message indicating they
will expose confidential information, exploit
a security flaw, or launch an attack that will
compromise the organization’s network — if
they are not paid a sum of money.
• A cyberterrorist is someone who uses the
Internet or network to destroy or damage
computers for political reasons. The
cyberterrorist might target the nation’s air
traffic control system, electricity-generating
com panies, or a telecommunications infrastructure.
The term, cyberwarfare, describes
an attack whose goal ranges from disabling a
government’s computer network to crippling
a country. Cyberterrorism and cyberwarfare
usually require a team of highly skilled
individuals, millions of dollars, and several years
of planning.
Business and home users must protect, or
safeguard, their computers from breaches of security
and other computer security risks. Some organizations
hire individuals previously convicted of
computer crimes to help identify security risks and
implement safeguards because these individuals
know how criminals attempt to breach security.
The more common computer security risks
include Internet and network attacks, unauthorized
access and use, hardware theft, software
theft, information theft, and system failure
(Figure 11-1). The following pages describe
these computer security risks and also discuss
safeguards users might take to minimize or
prevent their consequences.
SHARE

Milan Tomic

Hi. I’m Designer of Blog Magic. I’m CEO/Founder of ThemeXpose. I’m Creative Art Director, Web Designer, UI/UX Designer, Interaction Designer, Industrial Designer, Web Developer, Business Enthusiast, StartUp Enthusiast, Speaker, Writer and Photographer. Inspired to make things looks better.

  • Image
  • Image
  • Image
  • Image
  • Image
    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment