Computer Security
The security applied to computing devices such as computers and smartphones, as well as computer
networks such as private and public networks, including the whole Internet is called as Computer
Security
It includes physical security to prevent theft of equipment and information security to protect the data
on that equipment. It is sometimes referred to as "Cyber Security" or "IT security".
Cybersecurity is the process of applying security measures to ensure confidentiality, integrity, and
availability of data.
Computer Threats
A threat is a possible danger that might exploit a vulnerability to breach security and thus cause
possible harm.
It can be either "intentional" (i.e., intelligent; e.g., an individual cracker or a criminal organization) or
"accidental" (e.g., the possibility of a computer malfunctioning, or the possibility of a natural disaster
such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.
Computer Crime
Computer crime refers to any crime that involves a computer and a network. Net crime refers to
criminal exploitation of the Internet.
Cybercrimes are defined as: "Offences that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the reputation of the victim or cause
physical or mental harm to the victim directly or indirectly, using modern telecommunication
networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones
(SMS/MMS)".
Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of
crime has become high-profile, particularly those surrounding cracking, copyright infringement, child
pornography, and child grooming. There are also problems of privacy when confidential information
is lost or intercepted, lawfully or otherwise.
Topology of computer crime
Computer crime encompasses a broad range of activities. Generally, however, it may be divided into
two categories: (1) crimes that target computers directly; (2) crimes facilitated by computer networks
or devices, the primary target of which is independent of the computer network or device.
1. Crimes that primarily target computer networks or devices include: Computer viruses,
Denial-of-service attacks, Malware (malicious code)
2. Crimes that use computer networks or devices to advance other ends include: Cyberstalking, Fraud and identity theft, Information warfare, Phishing scams
Cyber Terrorism
Cyber terrorism in general, can be defined as an act of terrorism committed through the use of
cyberspace or computer resources. As such, a simple propaganda in the Internet, that there will be
bomb attacks during the holidays can be considered cyber-terrorism.
No comments:
Post a Comment