![](https://static.wixstatic.com/media/b462d2_541b93ee13ad48029f5f283ae4a9bfcc.jpg/v1/fill/w_980,h_402,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/b462d2_541b93ee13ad48029f5f283ae4a9bfcc.jpg)
TYPES OF COMPURITY SECURITY RISKS
INTERNET AND NETWORK ATTACK
HARDWARE THEFT
SOFTWARE THEFT
INFORMATION THEFT
SYSTEM FAILURE
UNAUTHORIZED ACCESS AND USE
Unauthorized access
- The use of computer or network wihout permission
Unauthorized use
- The use of a computer or its data for napproved or possibly illegal activities.
Hardware Theft
- Is the act of stealing computer equipment
Hardware Vandalisme
-The act of defacing or destroying computer equipment
- Steals software media
-Intentionally erases programs
-Illegal registers / activated a program
-Illegal copies a program
(Software Piracy -the unautorized and illegal duplication of copyrighted software)
- Occurs when someone steals personal or confidential information
- If stolen, the loss of information can cause as much damage as hardware and software theft
-Is the prolonged malfunction of a computer. System failure also can cause loss of hardware, software, data or information
Effect
- system failure
-Aging hardware : Natural disaster such as fires. flood, or hurricanes.
Denial of service attacks or DoS attack, is an assault whose purpose is to disrupt computer access to an Internet service such
as the Web or e-mail.
Zombie - A compromised computer, is one whose owner is unaware the computer is being controlled remotely by an outsider (zombie Army/ botnet).
Symptoms
The victim computer network slows down considerably. unresponsive or unavailable, blocking legitimate (legal) visitors from accessing the network.
is a scam in which a perpetrator (person) sends an official looking e-mail message that attempts to
obtain your personal and financial information.
is an unsolicited (unwanted) e-mail message or newsgroup posting sent to many recipients or newsgroups at once. Spam is Internet junk mail.