Ir al contenido principal

1. SECURITY THREAT.

Computer security is known as cyber security or security of information technologies.
The definition of information security should not be confused with that of "Computer Security", since the latter only deals with security in the computer environment, but the information can be found in different media or forms, and not only in media computer.
Computer Security encompasses a series of security measures, such as antivirus software programs, firewalls, and other measures that depend on the user, such as activating the deactivation of certain software functions, such as Java scripts, ActiveX, caring of the proper use of the computer, network or Internet resources.

The four main areas covered by computer security:
1. CONFIDENTIALITY: Only authorized users can access our resources, data and information.
2. INTEGRITY: Only authorized users can access our resources, data and information.
3. AVAILABILITY: Data must be available to users when necessary.
4. AUTHENTICATION: You are really communicating with those who think you are communicating.

The computer security measures you can take include:
*Ensure the installation of legally acquired software: legal software is usually free of Trojans or viruses.
*Antivirus suites: with properly defined configuration and system rules.
*Hardware and Software firewalls: firewalls help with the blocking of unauthorized users trying to access your computer or your network.
*Use of complex and large passwords: passwords must consist of several special characters, numbers and letters. This greatly helps a hacker to break it easily.
*Beware of social engineering: through social networks, cyber criminals may try to obtain data and information that they can use to carry out attacks.
A threat can be either "INTENTIONAL"(i.e. Hacking: an individual cracker or a criminal organization) or "accidental" (e.g. The possibility of a computer malfunctioning, or the possibility of a natural disaster such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action er event. 
   










Comentarios

Entradas más populares de este blog

CONCEPTUAL MAP

3. DELIBERATE ACT OF SABOTAGE OR VANDALISM.

SPAM: Receipt of unsolicited messages, mainly by email, whose it's a lot of commercial or propaganda messages.  Deliberate act of sabotage or vandalism (ex: Destruction of systems or information). Deliberate acts of theft (ex:Illegal Confiscation of equipment or information) Deliberate software attacks (ex: Viruses, worms, macros, denial-of-service) Deviations in quality of service from service providers(ex: Power and WAN issues). Forces of nature(ex: Flood, earthquake, fire, lightning). Technical or hardware failure or errors (ex: Equipment failure). Technical software failure or errors (ex: Bugs, code problems, unknown loopholes). Technological obsolescence (ex: Antiquated or outdated technologies). https://www.youtube.com/watch?v=ORD37NV_utY For me an act of vandalism means damage to morals or damage to public works, as you can see in this video there are two guys staining a wall, in computer science we can see how there a...