more information

Pages

Thursday, March 3, 2011

Privacy and Security

Sucurity risk
  1. Hardware theft- Stolen Computer
  2. Softwrae Theft- illegal copying
  3. Information Theft- stolen identity
  4. System Failure- Lighting Strike
  5. Internet and Network Attacks- Virus Attack
  6. unauthorized access and use- stealing proprietary information

internet and network attacks

-Computer viruses, worms and Trojan horses
-Trojan horses Symptom
  • Screen display unusual message or  image
  • available memory is less than you expected
  • files corrupted
  • unknown programs or files mysteriously appeear
  • music or unknown sound plays randomly
  • files and programs already exist disappeared
  • system properties change


-Worm and Trojan Horses deliver their payload on a computer in 4 basic ways;
  1. opens an infected files
  2. run an infected program
  3. boot the computer with infected removable media inserted in drive
  4. connects unprotected computer to a network
-HOW A VIRUS CAN SPREAD THROUGH AN E-MAIL MESSAGING


in any server like university, have good wall to protect from hackers???

-many university are already hacked with big amount of hacking detected..
-you can be look this video to the REALITY

No comments:

Post a Comment