Monday, March 16, 2009

Computer Ethics


Computer Security Ethics and Privacy
Summary Articles by Emmanuel Anuforo

This goes for CD, DVD and floppy disks. It's similar to a bacteria virus that infects humans because it gets into the body through small openings and can spread to other parts of the body and can cause some damage. it's just like a regular terrorist attack because it requires highly skilled individuals, millions of to implement and years of planning. You know when a computer is infected by a virus, worm or trojan horse if one or more of these acts happen : screen shots of weird messages or pictures appear. Over the internet there is no powerful administrator which makes the risk a lot higher. Although these are the common three there are many more variations and it would be almost impossible to list them. Computer viruses, worm and trojan horses are all classifies as malicious-logic programs which are just programs that deliberately harms a computer. Every unprotected computer is vulnerable to a computer virus which is a potentially harming computer operates without the user's consent. A script kiddie is someone who is like a cracker because they may have the intentions of doing harm but they usually lack the technical skills. Whenever you start a computer you should have no removable media in he drives. When you transfer information over a network it has a high security risk compared to information transmitted in a business network because the administrators usually take some etreme measures to help protect against security risks. They are usually silly teenagers that use prewritten hacking and cracking programs. You have less available memory then you epected music or sounds plays randomly. A cyberterrorist is someone who uses a computer network or the internet to destroy computers for political reasons. The typical network attacks that puts computers at risk includes viruses, worm, spoofing, trojan horses and denial of services attacks. The computer Emergency Response Team Coorindation Center is a place that can do this.

0 comments: