Consists of the provisions & policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network accessible resources.
Unauthorized Access/Used
Unauthorized used : Using a computer resource for unauthorized activity.
Types of unauthorized access/used.
1. Hacking - act of breaking into a computer or network. Using a computer to hack another computer system.
2. War Driving & Wi-Fi piggybacking - unauthorized used of a Wi-Fi network.
3. Interception of communication - gaining unauthorized access to the files/data/messages/e-mail.
Computer Sabotage
Acts of malicious destruction to a computer or computer resource.
Forms of computer sabotage :
- Botnet - computer that is controlled by a hacker.
- Denial of service - attempt to flood a network with so many requests for action. Leads to shuts down or simply cannot handle legitimate requests anymore.
- Computer viruses
Phishing
- attacks are performed with the intention to acquire personal information like credit card numbers, bank account.
- the recipients are encouraged to enter personal identification data.
- mocking the web presences of trusted corporations with the intention to trick customers.
- also employed for phishing attacks.
End users' security can be endangered through threats like adware, spyware, viruses and worms.
- Adware - programs used to deliver advertising content
- Spyware - intends to remain unrecognized
- Viruses - programs that are attached to executable files or documents. Virus is executed when the host program is executed or documents is loaded.
- Worms - programs that can replicate or copy themselves. Example : when it is being distributed as e-mail attachment, a worm might send a copy to all the address listed.
- Trojan horses - program do not replicate themselves but typically cause damage or compromise of security of infected computers. Damage caused varies include data theft and destruction or illegitimate access.
No comments:
Post a Comment