Professional Documents
Culture Documents
Information Security
Information Security
Information Security
Contents
• Malware
• Viruses
• Worms
• Trojan horses
• Rootkits
• Spyware
• Adware
Computer Security Risks
• Today, people rely on computers to create, store, and manage critical
information.
• Thus, it is crucial that users take measures to protect their computers
and data from loss, damage, and misuse.
• A computer security risk is any event or action that could cause a
loss of or damage to computer hardware, software, data, information,
or processing capability.
• Any
illegal act involving a computer generally is referred to as a
computer crime.
• The term cybercrime refers to online or Internet-based illegal acts.
Computer Security Risks
• A script kiddie has the same intent as a cracker but does not have the technical skills and
knowledge. Script kiddies often use prewritten hacking and cracking programs to break
into computers.
• Some corporate spies have excellent computer and networking skills and are hired to
break into a specific computer and steal its proprietary data and information.
Unscrupulous companies hire corporate spies to gain a competitive advantage.
• Unethical employees break into their employers’ computers for a variety of reasons.
Some simply want to exploit a security weakness. Others seek financial gains from selling
confidential information. Disgruntled employees may want revenge.
Computer Security Risks
• Once the virus infects the computer, it can spread throughout and may damage files and system
software, including the operating system.
• A worm is a program that copies itself repeatedly, for example in memory or on a network, using
up resources and possibly shutting down the computer or network.
• A Trojan horse is a program that hides within or looks like a legitimate program. A certain
condition or action usually triggers the Trojan horse. Unlike a virus
or worm, a Trojan horse does not replicate itself to other computers.
• A rootkit is a program that hides in a computer and allows someone from a remote location to
take full control of the computer. Once the rootkit is installed, the rootkit author can execute
programs, change settings, monitor activity, and access files on the remote computer.