latest Post

Computer security ethics, privacy


Today, many people rely on homework, work, create useful information, or store on computers. It is therefore important that the information on the computer be stored and properly maintained. It is also very important that people on your computer protect your computer from loss, misuse, and misuse of data. For example, it is important that companies keep safe information so that hackers can not access information. It is also necessary for the home user to confirm that it is a means to secure a credit card number and participate in online transactions. Computer security risk loses the possibility of causing information, software, data, incompatibilities of processing, or damage to the computer hardware, intentional violation of computer security is known as computer crime somewhat different from cypercrime It is. Cyber ​​crime is known as illegal activity based on the Internet, it is one of FBI's top priorities. There are multiple distinct departments for people who are refereed as hackers, crackers, cyberterrorist, cyberxtortionist, unethical employees, scripting children and organizations of the manuscript, causing Cybercrimes. The term hacker was actually known as a good word, but now it has a very negative view. Accessing a person as an up-access computer or computer network is illegal. It is often a security network that leaks that you are striking. Associated with rice cracker is bad for someone intentionally accessing a computer or computer network. Basically it is an evil hacker. They will access it with the intention of destroying or stealing information. Both crackers and hackers are very advanced network technology. Cyberterrorist is someone who uses computer networks or the Internet to destroy computers for political reasons. It's like a regular terrorist attack, so it's a very skilled individual, needing to implement millions of dollars, and a year of planning. The word cyperextortionist is someone who uses e-mail as an offensive force. They usually indicate that they release some confidential information to the company, exploit security leaks, or launch attacks that harm the company's network. Since they have not progressed like a black mail since I request the amount paid. Unethical employees are illegally employees who access their company's network for a number of reasons. The secret information of sales, or some part of it is reluctant to revenge. Script Kiddie is someone like a cracker because they may have the intent of doing harm but they usually use teens quickly and technically skill prewritten hacking and cracking programs is. The enterprise is extremely expensive computer and network technology to adopt certain computers or computer networks to steal or delete data and information. Companies with shadows hire these types of practice known as group intelligence activities. They practice this illegally to gain a competitive advantage. Protecting or protecting corporate and home users is a security risk from computers. The next part is to help pointers protect computers. However, if people transfer to information over the network, remember that there is no way to guarantee a 100 percent guarantee to protect computers as they become so much more knowledge about them, In order to take some extreme measures to protect against risks, there is no powerful administrator on the business net Internet to significantly increase the risk. Your computer is a website that always checks your computer for e-mail and Internet vulnerabilities Online security The company gives some guidance on how to fix these vulnerabilities. Computer Emergency Response Team Coordination Center is a place where you can do this. Representative network attacks and attacks on computers and viruses, including worms, spoofing, trojans, and denial of service attacks. Once all unprotected computers harm the computer and harm that could alter the way the computer operates without user consent Once this virus infects the whole computer and other files and potential damage It is the sales system itself. As it can penetrate the body through small openings, spread to other parts of the body and cause some damage, the similarity to human-infecting bacterial viruses is to prepare the best way to avoid. The copy itself itself that is repeating the computer warm program is a computer virus. But the difference is that the virus must attach itself to the executable file and need to become part of it. The computer worm seems to be copying to me and other networks and does not need to consume a lot of bandwidth. The Trojan horse, named after the famous Greek myth, secretly hides and actually looks like a regular program, but writes a program that is fake A certain action usually triggers a Trojan horse, Unlike viruses and worms it does not duplicate itself. Computer viruses, worms, Trojan horses are malicious as all categories - in logical programs, computers intentionally harm the program. Many of these three variations are almost impossible so I will list them. If your computer is infected with viruses, worms, Trojan horse, you know when these actions occur:

Review by 
 You may open the main menu you created
 Music and sound are played at random.
 File corruption
 The program does not work normally
 Stories Unknown files and programs are displayed randomly
 Variation in system characteristics

Computer virus, worm, Trojan horse delivered payload or instructions through common way. When you download many things, it is always necessary to scan the file, especially the executable file before you run it, so when you run the infected program individually, the individual is infected second. It is a reason why it is important not to leave media files in your computer when you shut it down, so when you connect to an individual bot fourth, it is a protected computer network. A very common way people get computer viruses, worms, or Trojans today is to keep infected files via e-mail attachments up to date with the new ones that come out everyday Because it's so important, a computer's malicious logic program and many new websites keep track of this. There is no known way to completely protect computers and computer networks from computer viruses, worms, Trojan horse, but there are some precautionary measures that drive from all removable media of the computer. It goes for CD, DVD, floppy disks. When the computer starts up, it tries to run the bot sectors on the drive. If the hard disk fails, you are about to reformat the drive, and you need to boot the computer for a specific reason, the disk is infected

About eWorld

eWorld
Recommended Posts × +

0 comments:

Post a Comment