SlideShare a Scribd company logo
1 of 26
4.0 COMPUTER ETHICS
    AND SECURITY

 4.2 Computer Security
     4.2.1 Computer Security Risks
LEARNING OUTCOMES:

   At the end of this topic, students should
    be able to:
           Define computer security risks.
           Identify types of security risks.




                                                2
DEFINITION

• Computer Security Risks
  is any event or action that could
  cause a loss of or damage to
  computer hardware, software, data,
  information, or processing
  capability.


                                       3
Types of Computer Security Risks
Types of Computer Security Risks
                Internet and network attack

               Unauthorized access and use

                      Hardware theft

                      Software theft

                     Information theft

                      System failure


                                              5
1. Internet and network attacks

• Information transmitted over networks has a higher
  degree of security risk than information kept on an
  organization’s premises.
1. Malware                           5. Spoofing




              Internet and
             network attacks

2. Botnets                 4. Denial of service attacks


                3. Back Doors
                                                      7
1a.Malware
• Malware (malicious software) – which are
    program that act without a user’s knowledge and
    deliberately alter the computer operation.
• Type of malware:
i. Computer viruses
ii. Worms
iii. Trojan Horses
iv. Rootkit
v. Back door
vi. Spyware
Malware
                                 Symptoms Malware

• Operating system runs much slower than usual
• Available memory is less than expected
• Files become corrupted
• Screen displays unusual message or image
• Music or unusual sound plays randomly
• Existing programs and files disappear

                                                 9
Malware
                                  Symptoms Malware

• Programs or files do not work properly
• Unknown programs or files mysteriously appear
• System properties change
• Operating system does not start up
• Operating system shuts down unexpectedly



                                                  10
Malware
                                           1. Worm




Is a program that copies itself repeatedly, for
example in memory or on a network, using up
resources and possibly shutting down the
computer or network.



                                                  11
Malware
                                2. Computer Virus


 is a potentially damaging computer program
that affects, or infects, a computer negatively by
altering the way the computer works without the
user’s knowledge or permission.




                                                     12
Malware
                             2. Computer Virus


 it can spread throughout and may damage files
and system software, including the operating
system.




                                              13
Internet and network attacks
                Malware
                                 3. Trojan horse



Is a program that hides within or looks like a
legitimate program. It does not replicate itself
to other computers.




                                                   14
Internet and network attacks
                 Malware
                                3. Trojan horse



it can spread throughout and may damage files
and system software, including the operating
system.




                                                15
Internet and network attacks
                Malware
                                   4. Rootkit


•Is a program that hides in a computer and allows
someone from a remote location to take full control
of the computer.

•The rootkit author can execute programs, change
settings, monitor activity, and access files on the
remote computer

                                                 16
Internet and network attacks
                Malware
                        5. Spyware & Adware


• Spyware is a program placed on a computer
without the users knowledge that secretly collects
information about the user.

• Adware is a program that displays an online
advertisement in a banner or pop-up window on
web pages, e-mail messages or other internet
services
                                                17
1b.Botnets

• a group of compromised computers
  connected to a network such as the Internet
  that are used as part of a network that attacks
  other networks, usually for nefarious
  purposes.
1c.Back Door

• A program or set of instructions in a program
  that allow users to bypass security controls
  when accessing a program, computer, or
  network
1d.Denial of Service Attacks

 Denial of service attacks or DoS attack, is
  an assault whose purpose is to disrupt
  computer access to an Internet service such
  as the Web or e-mail.
1e.Spoofing

• A technique intruders use to make their
  network or Internet transmission appear
  legitimate to a victim computer or network.
2.Unauthorized Access and Use

                 Unauthorized access
The use of a computer or network without permission.


                  Unauthorized use
The use of a computer or its data for unapproved or
 possibly illegal activities.
3.Hardware Theft and Vandalism

                Hardware theft
Is the act of stealing computer equipment.

             Hardware vandalism
The act of defacing or destroying computer
 equipment.
4.Software Theft

 Steals         Intentionally
software           erases
 media            programs



                  Illegally
Illegally        registers
copies a           and/or
program         activates a
                 program
5.Information Theft



Occurs when someone steals personal or
confidential information.
If stolen, the loss of information can cause as
much damage as (if not more than) hardware or
software theft.
System Failure



A system failure is the prolonged malfunction of a
computer

A variety of factors can lead to system failure,
including:
   • Aging hardware
   • Natural disasters
   • Electrical power problems
      • Noise, undervoltages, and overvoltages
   • Errors in computer programs

More Related Content

What's hot

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxANIKETKUMARSHARMA3
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
cyber security
cyber security cyber security
cyber security
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
system Security
system Security system Security
system Security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Viewers also liked

Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Bussiness communication
Bussiness communicationBussiness communication
Bussiness communicationAli Kamran
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Bussiness communication
Bussiness communicationBussiness communication
Bussiness communicationnet ambit
 
Intro to business communication
Intro to business communicationIntro to business communication
Intro to business communicationugik sugiharto
 
Management information system
Management information systemManagement information system
Management information systemAnamika Sonawane
 
Management information system
Management information systemManagement information system
Management information systemSikander Saini
 

Viewers also liked (11)

Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Bussiness communication
Bussiness communicationBussiness communication
Bussiness communication
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Bussiness communication
Bussiness communicationBussiness communication
Bussiness communication
 
Intro to business communication
Intro to business communicationIntro to business communication
Intro to business communication
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Management information system
Management information systemManagement information system
Management information system
 
Management information system
Management information systemManagement information system
Management information system
 

Similar to Computer Security Risks

Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimenidhidgowda185
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 

Similar to Computer Security Risks (20)

Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
It ppt new
It ppt newIt ppt new
It ppt new
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Malicious
MaliciousMalicious
Malicious
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Computer security
Computer securityComputer security
Computer security
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 

More from hazirma

2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquettehazirma
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of websitehazirma
 
2.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.42.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.4hazirma
 
2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isphazirma
 
2.2.1.1 evolution of internet
2.2.1.1 evolution of internet2.2.1.1 evolution of internet
2.2.1.1 evolution of internethazirma
 
2.1.1 network topology
2.1.1 network topology2.1.1 network topology
2.1.1 network topologyhazirma
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of websitehazirma
 
Tutorial pdt sem 1
Tutorial pdt sem 1Tutorial pdt sem 1
Tutorial pdt sem 1hazirma
 
3.1.1 computer ethics
3.1.1 computer ethics3.1.1 computer ethics
3.1.1 computer ethicshazirma
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measureshazirma
 
2.3 the internet services
2.3 the internet services2.3 the internet services
2.3 the internet serviceshazirma
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquettehazirma
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of websitehazirma
 
C topic 3.3 the internet services 2
C topic 3.3 the internet services 2C topic 3.3 the internet services 2
C topic 3.3 the internet services 2hazirma
 
2.2.2.4 Information Searching
2.2.2.4 Information Searching2.2.2.4 Information Searching
2.2.2.4 Information Searchinghazirma
 
2.2.2.2 Web Address
2.2.2.2 Web Address2.2.2.2 Web Address
2.2.2.2 Web Addresshazirma
 
2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browserhazirma
 
2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizahhazirma
 
2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigationhazirma
 
2.2.1.2 The Internet Connection
2.2.1.2 The Internet Connection 2.2.1.2 The Internet Connection
2.2.1.2 The Internet Connection hazirma
 

More from hazirma (20)

2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website
 
2.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.42.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.4
 
2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp
 
2.2.1.1 evolution of internet
2.2.1.1 evolution of internet2.2.1.1 evolution of internet
2.2.1.1 evolution of internet
 
2.1.1 network topology
2.1.1 network topology2.1.1 network topology
2.1.1 network topology
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of website
 
Tutorial pdt sem 1
Tutorial pdt sem 1Tutorial pdt sem 1
Tutorial pdt sem 1
 
3.1.1 computer ethics
3.1.1 computer ethics3.1.1 computer ethics
3.1.1 computer ethics
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
2.3 the internet services
2.3 the internet services2.3 the internet services
2.3 the internet services
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquette
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of website
 
C topic 3.3 the internet services 2
C topic 3.3 the internet services 2C topic 3.3 the internet services 2
C topic 3.3 the internet services 2
 
2.2.2.4 Information Searching
2.2.2.4 Information Searching2.2.2.4 Information Searching
2.2.2.4 Information Searching
 
2.2.2.2 Web Address
2.2.2.2 Web Address2.2.2.2 Web Address
2.2.2.2 Web Address
 
2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browser
 
2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah
 
2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation
 
2.2.1.2 The Internet Connection
2.2.1.2 The Internet Connection 2.2.1.2 The Internet Connection
2.2.1.2 The Internet Connection
 

Computer Security Risks

  • 1. 4.0 COMPUTER ETHICS AND SECURITY 4.2 Computer Security 4.2.1 Computer Security Risks
  • 2. LEARNING OUTCOMES:  At the end of this topic, students should be able to:  Define computer security risks.  Identify types of security risks. 2
  • 3. DEFINITION • Computer Security Risks is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. 3
  • 4. Types of Computer Security Risks
  • 5. Types of Computer Security Risks Internet and network attack Unauthorized access and use Hardware theft Software theft Information theft System failure 5
  • 6. 1. Internet and network attacks • Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises.
  • 7. 1. Malware 5. Spoofing Internet and network attacks 2. Botnets 4. Denial of service attacks 3. Back Doors 7
  • 8. 1a.Malware • Malware (malicious software) – which are program that act without a user’s knowledge and deliberately alter the computer operation. • Type of malware: i. Computer viruses ii. Worms iii. Trojan Horses iv. Rootkit v. Back door vi. Spyware
  • 9. Malware Symptoms Malware • Operating system runs much slower than usual • Available memory is less than expected • Files become corrupted • Screen displays unusual message or image • Music or unusual sound plays randomly • Existing programs and files disappear 9
  • 10. Malware Symptoms Malware • Programs or files do not work properly • Unknown programs or files mysteriously appear • System properties change • Operating system does not start up • Operating system shuts down unexpectedly 10
  • 11. Malware 1. Worm Is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network. 11
  • 12. Malware 2. Computer Virus  is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. 12
  • 13. Malware 2. Computer Virus  it can spread throughout and may damage files and system software, including the operating system. 13
  • 14. Internet and network attacks Malware 3. Trojan horse Is a program that hides within or looks like a legitimate program. It does not replicate itself to other computers. 14
  • 15. Internet and network attacks Malware 3. Trojan horse it can spread throughout and may damage files and system software, including the operating system. 15
  • 16. Internet and network attacks Malware 4. Rootkit •Is a program that hides in a computer and allows someone from a remote location to take full control of the computer. •The rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer 16
  • 17. Internet and network attacks Malware 5. Spyware & Adware • Spyware is a program placed on a computer without the users knowledge that secretly collects information about the user. • Adware is a program that displays an online advertisement in a banner or pop-up window on web pages, e-mail messages or other internet services 17
  • 18. 1b.Botnets • a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
  • 19. 1c.Back Door • A program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
  • 20. 1d.Denial of Service Attacks  Denial of service attacks or DoS attack, is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
  • 21. 1e.Spoofing • A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
  • 22. 2.Unauthorized Access and Use Unauthorized access The use of a computer or network without permission. Unauthorized use The use of a computer or its data for unapproved or possibly illegal activities.
  • 23. 3.Hardware Theft and Vandalism Hardware theft Is the act of stealing computer equipment. Hardware vandalism The act of defacing or destroying computer equipment.
  • 24. 4.Software Theft Steals Intentionally software erases media programs Illegally Illegally registers copies a and/or program activates a program
  • 25. 5.Information Theft Occurs when someone steals personal or confidential information. If stolen, the loss of information can cause as much damage as (if not more than) hardware or software theft.
  • 26. System Failure A system failure is the prolonged malfunction of a computer A variety of factors can lead to system failure, including: • Aging hardware • Natural disasters • Electrical power problems • Noise, undervoltages, and overvoltages • Errors in computer programs