Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
Cybercrime
An online or Internet-based illegal act
Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises
Computer virus
Affects a computer negatively by altering the way the computer works
Worm
Copies itself repeatedly, using up resources and possibly shutting down the computer or network
Trojan horse
A malicious program that hides within or looks like a legitimate program
Rootkit
Program that hides in a computer and allows someone from a remote location to take full control
Symptoms of an infected computer
Operating system runs much slower than usual
Available memory is less than expected
Files become corrupted
Screen displays unusual message or image
Music or unusual sound plays randomly
Existing programs and files disappear
Programs or files do not work properly
Unknown programs or files mysteriously appear
System properties change
Operating system does not start up
Operating system shuts down unexpectedly
Precautions users can take to protect their home and work computers and mobile devices
Install antivirus software
Keep software up-to-date
Use a firewall
Be cautious when opening email attachments
Be cautious when downloading files from the Internet
Back up data regularly
Botnet
A group of compromised computers connected to a network
Zombie
A compromised computer in a botnet
Denial of service attack (DoS attack)
Disrupts computer access to Internet services
Back door
A program or set of instructions in a program that allow users to bypass security controls
Spoofing
A technique intruders use to make their network or Internet transmission appear legitimate
Firewall
Hardware and/or software that protects a network's resources from intrusion
Intrusion detection software
Analyzes all network traffic
Assesses system vulnerabilities
Identifies any unauthorized intrusions
Notifies network administrators of suspicious behavior patterns or security breaches
Unauthorized access
The use of a computer or network without permission
Unauthorized use
The use of a computer or its data for unapproved or possibly illegal activities
Access controls
Define who can access a computer, when they can access it, and what actions they can take
Two-phase processes called identification and authentication
User name
Password
CAPTCHA
Possessed object
Any item that you must carry to gain access to a computer or computer facility
Biometric device
Authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
Digital forensics
The discovery, collection, and analysis of evidence found on computers and networks
Areas that use digital forensics
Law enforcement
Criminal prosecutors
Military intelligence
Insurance agencies
Information security departments
Hardware theft
The act of stealing computer equipment
Hardware vandalism
The act of defacing or destroying computer equipment
Security measures to reduce hardware theft and vandalism
Physical access controls
Alarm systems
Cables to lock equipment
Real time location system
Passwords, possessed objects, and biometrics
Software theft
When someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program
Single-user license agreement
Permitted to: Install the software on one computer, make one copy of the software, remove the software from your computer before giving it away or selling it
Not permitted to: Install the software on a network, give copies to friends or colleagues while continuing to use the software, export the software, rent or lease the software
Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law
Some software requires product activation to function fully
Information theft
When someone steals personal or confidential information
Encryption
A process of converting readable data into unreadable characters to prevent unauthorized access
Digital signature
An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
Digital certificate
A notice that guarantees a user or a Web site is legitimate, issued by a certificate authority
System failure
The prolonged malfunction of a computer
Factors that can lead to system failure
Aging hardware
Natural disasters
Electrical power problems
Errors in computer programs
Factors that can lead to system failure
Aging hardware
Natural disasters
Electrical power problems
Errors in computer programs
Surge protectors
A way to protect from system failures caused by electrical power variations
Uninterruptable power supply (UPS)
A way to protect from system failures caused by electrical power variations