Ir al contenido principal

3. DELIBERATE ACT OF SABOTAGE OR VANDALISM.

SPAM: Receipt of unsolicited messages, mainly by email, whose it's a lot of commercial or propaganda messages. 
  • Deliberate act of sabotage or vandalism (ex: Destruction of systems or information).

  • Deliberate acts of theft (ex:Illegal Confiscation of equipment or information)



  • Deliberate software attacks (ex: Viruses, worms, macros, denial-of-service)

  • Deviations in quality of service from service providers(ex: Power and WAN issues).
  • Forces of nature(ex: Flood, earthquake, fire, lightning).
  • Technical or hardware failure or errors (ex: Equipment failure).
  • Technical software failure or errors (ex: Bugs, code problems, unknown loopholes).
  • Technological obsolescence (ex: Antiquated or outdated technologies).

For me an act of vandalism means damage to morals or damage to public works, as you can see in this video there are two guys staining a wall, in computer science we can see how there are people who cross our integrity publicly, making publications that harm us.

Comentarios

Entradas más populares de este blog

1. SECURITY THREAT.

Computer security is known as cyber security or security of information technologies. The definition of information security should not be confused with that of "Computer Security", since the latter only deals with security in the computer environment, but the information can be found in different media or forms, and not only in media computer. Computer Security encompasses a series of security measures, such as antivirus software programs, firewalls, and other measures that depend on the user, such as activating the deactivation of certain software functions, such as Java scripts, ActiveX, caring of the proper use of the computer, network or Internet resources. The four main areas covered by computer security: 1. CONFIDENTIALITY: Only authorized users can access our resources, data and information. 2. INTEGRITY: Only authorized users can access our resources, data and information. 3. AVAILABILITY: Data must be available to users when necessary. 4. AUT

CONCEPTUAL MAP