Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it's important for the information to be stored and kept properly. It's also extremely important to protect computers from data loss, misuse and abuse. For example, businesses need to keep their information secure and shielded from hackers. Home users also need to ensure their credit card numbers are secure when participating in online transactions. A computer security risk is any action that could cause loss of information to software, data, processing incompatibilities or damage to computer hardware.
An intentional breach in computer security is known as a computer crime, which ...view middle of the document...
They use blackmail to demand a certain amount of money in exchange for not launching an attack.
An unethical employee is one who illegally accesses their company’s network for numerous reasons. One could be the money they can get from selling top secret information, or some may be bitter and want revenge.
A script kiddie is similar to a cracker because they might want to do harm, but often lack the technical skills. Script kiddies tend to use prewritten hacking and cracking programs.
A corporate spy has extensive computer and networking skills and is hired to break into a specific computer or computer network to steal, delete data and/or information. Shady companies hire these types’ people in a practice known as corporate espionage. They do this to gain an advantage over their competition. Business and home users must do their best to protect or safeguard their computers from security risks. The next part of this article will give some pointers to help protect your computer. However, one must remember that there is no guaranteed way of protecting your computer, so learning about your options is important.
When you transfer information over a network it has a high security risk compared to information transmitted in a business network because the administrators usually take stringent measures to protect against security risks. Over the Internet the risk is much higher. If you're not sure if your computer is secure, it's advisable to use an online security service to check your computer for email and Internet vulnerabilities. The company will then give some pointers on how to correct these vulnerabilities. The Computer Emergency Response Team Coordination Center is a good resource.
The typical network attacks that put computers at risk are: viruses, worms, spoofing, Trojan horses and denial of service attacks. Every unprotected computer is vulnerable to a computer virus. Once the virus is in the computer it can spread throughout, infecting other files and potentially damaging the operating system itself.
A computer worm is a program that repeatedly copies itself and is similar to a computer virus. However, a virus needs to attach itself...