Friday, 9 March 2018

Types of Computer Security Risk


MALICIOUS CODE.

A computer virus is a potentially damaging computer program that affects or infects a computer negatively by altering the way the computer works without the user's knowledge or permissions.

Differences of Malicious Code.


  • Computer virus.


Attached itself to a program or file which cannot spread without human action.
When we run or open a file in which virus is present then it starts effecting and starts spreading.


  • Worm.


Worm is similar to virus but spreads without human action.
It gets multiplied or copied itself into hundred or thousands in number.
Spread itself into other computers through mail or address box.


  • Trojan Horse.


Similar to virus and worm but it does not spread or reproduce
It looks similar to a software but will actually damage once installed or run it.
Can cause severe damage such as deleting files.


  • UNAUTHORIZED ACCESS AND USE.

Related image

                                         
Unauthorized access is when someone gains access to a website, program, server, service, or other system using someone else's account or other methods. For example, if someone kept guessing a password or username for an account that was not theirs until they gained access it is considered unauthorized access.Unauthorized access could also occur if a user attempts to access an area of a system they should not be accessing. When attempting to access that area, they would be denied access and possibly see an unauthorized access message.

Some system administrators set up alerts to let them know when there is an unauthorized access attempt, so that they may investigate the reason. These alerts can help stop hackers from gaining access to a secure or confidential system. Many secure systems may also lock an account that has had too many failed login attempts.



  • HARDWARE THEFT

  Image result for hardware theft
Hardware Theft- is the act of stealing computer equipment. Hardware Vandalism- is the act of defacing or destroying computer equipment.



  • SOFTWARE THEFT.

     Image result for software theft
Software theft. (legal) The unauthorized duplication and/or use of computer software. This usually means unauthorized copying, either by individuals for use by themselves or their friends or, less commonly, by companies who then sell the illegal copies to users.



  • INFORMATION THEFT

        Image result for information theft

Information theft occurs when someone steals personal or confidential information. If stolen, the loss of information can cause as much damage as hardware or software  theft.



  • SYSTEM FAILURE.

Image result for system failure
A system failure can occur because of a hardware failure or a severe software issue, causing the system to freeze, reboot, or stop functioning altogether. A system failure may or may not result in an error being displayed on the screen. The computer may shut off without warning and without any error message. If an error message is displayed, it often is displayed as a Blue Screen of Death error.

No comments:

Post a Comment

Type of Website

PORTAL A web site that offers variety of internet services from single, convenient location. Example : Yahoo.com, MSN.com ...