Читайте также:
|
|
To utilize
Virtual
Data & Internet Security
Types of cybercrimes:
hacking
phishing (bank fraud)
scam (email fraud)
virus propagation
identity theft
cyberstalking
IP spoofing
social engineering
cracking passwords
piracy / intellectual property theft
A hacker can:
break into a computer system
illegally enter a computer system
steal sensitive / confidential information
spread viruses
attempt to obtain information
crack software codes
Types of malware (malicious software):
viruses
worms
Trojans
spyware
adware
rootkits
backdoors
Viruses / spyware can:
infiltrate a computer system
access a computer system
to infect a computer with malicious codes
damage a computer
alter computer data
stay resident in computer memory
propagate to other files or programs
compromise privacy
collect information from your PC without your consent
A worm can:
spread
self-copy
replicate itself
reproduce itself by infecting other files
exploit security flaws in computer networks
A Trojan [ˈtrəʊdʒ(ə)n] horse can:
be disguised as a useful program
be embedded within legitimate software
To avoid risks you can:
run and update anti-virus software
install a firewall
go to secure websites
disable or delete cookies
use a digital certificate
set security alerts
encrypt your email / files
Anti-virus [ˈæntiˌvaɪrəs] software can:
detect spyware and viruses
protect a computer from spyware
protect crucial data
help to avoid risks
Reassess their approach
Maintain and expand any number of networks to include family
People who share a similar interest
Used properly and with discretion
A valuable resource for businesses looking to expand their visibility
Carry out initial background checks on new recruits
A discreet way to check on what
Saying in the public domain
The study fails to factor in an important element
Expose an organization to security threats
Ban access
Set limits and restriction on their use
Unmonitored access
An optimal solution
Keen on keeping the status quo
Taking a heavy handed approach
Counterproductive
Indicate a lack of trust in employees
Justified to an extent
To give unfettered access
Further on
A trigger event
Misdirection – reproduction – trigger – payload routine
To hide the presence of code
Black-hat hackers
Online harassment
Ominous
Shareware applications
Downloadable
Affect data security
Compliant with
Put it in a sort of virtual envelope
Impose limits
Basic safeguards are in place
Up-to-date anti-virus software
Ability to monitor social networking sites
Problem per se
A cause for concern
Дата добавления: 2015-11-16; просмотров: 45 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
Instant forms of communication | | | Disclose certain information |