top of page

TYPES OF COMPURITY SECURITY RISKS

INTERNET AND NETWORK ATTACK

HARDWARE THEFT

SOFTWARE THEFT

INFORMATION THEFT

SYSTEM FAILURE

UNAUTHORIZED ACCESS AND USE

Unauthorized access

- The use of computer or network wihout permission

 

Unauthorized use

- The use of a computer or its data for napproved or possibly illegal activities.

 

Hardware Theft

- Is the act of stealing computer equipment

 

Hardware Vandalisme

-The act of defacing or destroying computer equipment

- Steals software media 

-Intentionally erases programs

-Illegal registers / activated a program

-Illegal copies a program

(Software Piracy -the unautorized and illegal duplication of copyrighted software)

- Occurs when someone steals personal or confidential information

- If stolen, the loss of information can cause as much damage as hardware and software theft

-Is the prolonged malfunction of a computer. System failure also can cause loss of hardware, software, data or information

 

Effect

- system failure

-Aging hardware : Natural disaster such as fires. flood, or hurricanes.

- Spoofing

- Packet siffing

- Clickjacking

- Malware

- Denial of service attacks

Denial of service attacks or DoS attack, is an assault whose purpose is to disrupt computer access to an Internet service such
as the Web or e-mail.


Zombie - A compromised computer, is one whose owner is unaware the computer is being controlled remotely by an outsider (zombie Army/ botnet).
Symptoms


The victim computer network slows down considerably. unresponsive or unavailable, blocking legitimate (legal) visitors from accessing the network.

is a scam in which a perpetrator (person) sends an official looking e-mail message that attempts to
obtain your personal and financial information.

is an unsolicited (unwanted) e-mail message or newsgroup posting sent to many recipients or newsgroups at once. Spam is Internet junk mail.

SPOOFING

TECH TEAM

Computer Support​

© 2023 by TECH TEAM. Proudly created with Wix.com

T: 1-800-000-0000
  • facebook-square
  • Twitter Square
  • google-plus-square
bottom of page