Ir al contenido principal

5. REFLECTION.

¿Por qué es tan importante la seguridad informática?

Comentarios

  1. Hay muchos casos de personas a las que le hackean cuentas de sus redes sociales, también a empresas logran entrar a sus base de datos para obtener información. Para evitar esos tipos de problemas es necesario tener seguridad informática y no nos roben la información importante que tiene cada uno.

    ResponderBorrar
  2. Por la cantidad de información que se tiene en los dispositivos .Estos ciberataques no sólo afectan a clientes o inversores de dichas compañías, sino que pueden llegar a afectar a la seguridad nacional o regional de los distintos estados además de la propia empresa.

    ResponderBorrar

Publicar un comentario

Entradas más populares de este blog

3. DELIBERATE ACT OF SABOTAGE OR VANDALISM.

SPAM: Receipt of unsolicited messages, mainly by email, whose it's a lot of commercial or propaganda messages.  Deliberate act of sabotage or vandalism (ex: Destruction of systems or information). Deliberate acts of theft (ex:Illegal Confiscation of equipment or information) Deliberate software attacks (ex: Viruses, worms, macros, denial-of-service) Deviations in quality of service from service providers(ex: Power and WAN issues). Forces of nature(ex: Flood, earthquake, fire, lightning). Technical or hardware failure or errors (ex: Equipment failure). Technical software failure or errors (ex: Bugs, code problems, unknown loopholes). Technological obsolescence (ex: Antiquated or outdated technologies). https://www.youtube.com/watch?v=ORD37NV_utY For me an act of vandalism means damage to morals or damage to public works, as you can see in this video there are two guys staining a wall, in computer science we can see how there a...

4.DELIBERATE ACT OF TRESPASS.

Unauthorized access to info. That an organization is trying to protect. A person is guilty of computer trespass if s/he intentionally and without authorization accesses, alters, deletes, damages, destroys, or disrupts any computer, computer system, computer network, computer program, or data. Computer trespass is directes generally towards computer hackers. There are state specific laws on the subject which varies from state to state. However a key element for all computer trespass offences is lack of of authorization to access a computer or computer system. The following is an example of a State Statute (New York) defining computer Trespass: NY CLS Penal $156.10 Computer trespass. A person is guilty of computer trespass when he or she knowingly uses, causes to be used, or accesses a computer, computer service, or computer network without authorization and: 1. He or she does so with an intent to commit or attempt to commit or further the commission of any felony;  o...