Computer security risks include cybercrime, hackers, crackers, script kiddies, cyberextortionists, and cyberterrorists illegally accessing networks and computers. To protect against viruses and malware, precautions should be taken like not opening attachments from unknown sources, enabling macro security in programs, installing antivirus software and updating it frequently with the latest virus definitions.
2. Computer Security Risks
A computer security risk is any event or
action that could cause a loss of or damage to
computer hardware, software, data, information,
or processing capability
3. Cybercrime
Any illegal act involving a computer
generally is referred to as a computer crime.
The term cybercrime refers to online or
Internet-based illegal acts. Software used by
cybercriminals sometimes is called crimeware.
Today, cybercrime is one of the FBIs top three
priorities.
4. Hacker
Someone who accesses a
computer or network illegally is called hacker.
Some hackers
claim the intent of their security breaches is
to improve security.
5. Cracker
A cracker also is someone who accesses
a computer or network illegally but has
the intent of destroying data, stealing
information, or other malicious action.
Both hackers and crackers have advanced
computer and network skills.
6. Script kiddie
A script kiddie has the same intent as a
cracker but does not have the technical skills
7. Cyberextortionist
(CRIMINAL LAW obtaining something by illegal threats)
A cyberextortionist is someone who uses
e-mail as a vehicle for extortion. These
perpetrators send an organization a
threatening e-mail message indicating they
will expose confidential information, exploit
a security flaw, or launch an attack that will
compromise the organizations network if
they are not paid a sum of money.
8. Cyberterrorist
A cyberterrorist is someone who uses the
Internet or network to destroy or damage computers for political
reasons. The
cyberterrorist might target the nations air
traffic control system, electricity-generating companies, or a
telecommunications infrastructure.
The term, cyberwarfare, describes an attack whose goal ranges from
disabling a governments computer network to crippling
a country. Cyberterrorism and cyberwarfare usually require a team of
highly skilled
9. Internet and Network Attacks
Information transmitted over networks has a
higher degree of security risk than information
kept on an organizations premises. In an organization,
network administrators usually take
measures to protect a network from security
risks. On the Internet, where no central administrator
is present, the security risk is greater.
10. Security service
To determine if your computer is vulnerable
to an Internet or network attack, you
could use an online security service. An online
security service is a Web site that evaluates
your computer to check for Internet and e-mail
vulnera bilities
12. Safeguards against Computer Viruses
and Other Malware
Methods that guarantee a computer or
network is safe from computer viruses and other
malware simply do not exist. Users can take several
precautions, however, to protect their home
and work computers and mobile devices from
these malicious infections
13. Precautions
Do not start a computer with removable media inserted in the drives or plugged in the ports.
For example, optical disc drives should be empty, and a USB port should not contain a USB
flash
drive. During the startup process, a computer
may attempt to execute the boot sector on media
in certain drives and ports. Even if the attempt is
unsuccessful, a virus on the boot sector of removable
media can infect the computers hard disk.
If you must start the computer with media in a
drive or port, be certain the media are uninfected
or from a trusted source
14. Precautions
Never open an e-mail attachment unless you
are expecting the attachment and it is from a
trusted source. If the e-mail message is from an
unknown source or untrusted source, delete the
e-mail message immediately without opening
or executing any attachments.
15. Precautions
Some viruses are hidden in macros, which
are instructions saved in software such as a word
processing or spreadsheet program. In programs
that allow users to write macros, you should set
the macro security level so that the application
software warns users that a document they are
attempting to open contains a macro
16. Precautions
Users should install an antivirus program and
update it frequently.
An antivirus program protects a computer against
viruses by identifying and removing any computer
viruses found in memory, on storage media,
or on incoming files.
17. Precautions
One technique that antivirus programs use to
identify a virus is to look for virus signatures. A
virus signature, also called a virus definition, is
a known specific pattern of virus code. Computer
users should update their antivirus programs
signature files regularly