Ir al contenido principal

Entradas

Mostrando las entradas de julio, 2018

CONCEPTUAL MAP

1. SECURITY THREAT.

Computer security is known as cyber security or security of information technologies. The definition of information security should not be confused with that of "Computer Security", since the latter only deals with security in the computer environment, but the information can be found in different media or forms, and not only in media computer. Computer Security encompasses a series of security measures, such as antivirus software programs, firewalls, and other measures that depend on the user, such as activating the deactivation of certain software functions, such as Java scripts, ActiveX, caring of the proper use of the computer, network or Internet resources. The four main areas covered by computer security: 1. CONFIDENTIALITY: Only authorized users can access our resources, data and information. 2. INTEGRITY: Only authorized users can access our resources, data and information. 3. AVAILABILITY: Data must be available to users when necessary. 4. AUT...

2.DELIBERATE ACT OF INFORMATION EXTORTION/BLACKMAIL

Illicit access will be typified in the event that a person accesses a computer system, however without authorization and could even exceed generating the security measures are violated. It is to be noticed, after reading the referred  article, does not require your configuration to subtract or delete information. It has the following characteristics: *The active subject is the one who accesses the computer system. *The taxpayer is the owner of this system, who can be a natural person or legal. *The behavior committed by the agent is fraudulent since he has had the will to access the computer system, without having an authorization or has exceeded of what he has. 

4.DELIBERATE ACT OF TRESPASS.

Unauthorized access to info. That an organization is trying to protect. A person is guilty of computer trespass if s/he intentionally and without authorization accesses, alters, deletes, damages, destroys, or disrupts any computer, computer system, computer network, computer program, or data. Computer trespass is directes generally towards computer hackers. There are state specific laws on the subject which varies from state to state. However a key element for all computer trespass offences is lack of of authorization to access a computer or computer system. The following is an example of a State Statute (New York) defining computer Trespass: NY CLS Penal $156.10 Computer trespass. A person is guilty of computer trespass when he or she knowingly uses, causes to be used, or accesses a computer, computer service, or computer network without authorization and: 1. He or she does so with an intent to commit or attempt to commit or further the commission of any felony;  o...

3. DELIBERATE ACT OF SABOTAGE OR VANDALISM.

SPAM: Receipt of unsolicited messages, mainly by email, whose it's a lot of commercial or propaganda messages.  Deliberate act of sabotage or vandalism (ex: Destruction of systems or information). Deliberate acts of theft (ex:Illegal Confiscation of equipment or information) Deliberate software attacks (ex: Viruses, worms, macros, denial-of-service) Deviations in quality of service from service providers(ex: Power and WAN issues). Forces of nature(ex: Flood, earthquake, fire, lightning). Technical or hardware failure or errors (ex: Equipment failure). Technical software failure or errors (ex: Bugs, code problems, unknown loopholes). Technological obsolescence (ex: Antiquated or outdated technologies). https://www.youtube.com/watch?v=ORD37NV_utY For me an act of vandalism means damage to morals or damage to public works, as you can see in this video there are two guys staining a wall, in computer science we can see how there a...