Ir al contenido principal

5. REFLECTION.

¿Por qué es tan importante la seguridad informática?

Comentarios

  1. Hay muchos casos de personas a las que le hackean cuentas de sus redes sociales, también a empresas logran entrar a sus base de datos para obtener información. Para evitar esos tipos de problemas es necesario tener seguridad informática y no nos roben la información importante que tiene cada uno.

    ResponderBorrar
  2. Por la cantidad de información que se tiene en los dispositivos .Estos ciberataques no sólo afectan a clientes o inversores de dichas compañías, sino que pueden llegar a afectar a la seguridad nacional o regional de los distintos estados además de la propia empresa.

    ResponderBorrar

Publicar un comentario

Entradas más populares de este blog

1. SECURITY THREAT.

Computer security is known as cyber security or security of information technologies. The definition of information security should not be confused with that of "Computer Security", since the latter only deals with security in the computer environment, but the information can be found in different media or forms, and not only in media computer. Computer Security encompasses a series of security measures, such as antivirus software programs, firewalls, and other measures that depend on the user, such as activating the deactivation of certain software functions, such as Java scripts, ActiveX, caring of the proper use of the computer, network or Internet resources. The four main areas covered by computer security: 1. CONFIDENTIALITY: Only authorized users can access our resources, data and information. 2. INTEGRITY: Only authorized users can access our resources, data and information. 3. AVAILABILITY: Data must be available to users when necessary. 4. AUT...

CONCEPTUAL MAP

2.DELIBERATE ACT OF INFORMATION EXTORTION/BLACKMAIL

Illicit access will be typified in the event that a person accesses a computer system, however without authorization and could even exceed generating the security measures are violated. It is to be noticed, after reading the referred  article, does not require your configuration to subtract or delete information. It has the following characteristics: *The active subject is the one who accesses the computer system. *The taxpayer is the owner of this system, who can be a natural person or legal. *The behavior committed by the agent is fraudulent since he has had the will to access the computer system, without having an authorization or has exceeded of what he has.