Professional Documents
Culture Documents
WEEK 3-4
TOPIC ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE
Internet security
ConfidentIality
Data confidentiality Privacy
Integrit
Data integerity System integrity
Availability
Threat Consequence Threat Action ( Attack)
Usurpation
A circumstances or event that results Misappropriation: An entity assumes
in control of system services or unauthorized logical or physical control of a
functions by an unauthorized entity. system resource.
Misuse: Causes a system component to perform a function or service that is detrimental to system security.
Types of System Intruders
Masquerader
Hackers
Clandestine user
Parts of Virus
Infection mechanism
Trigger
PayloaD
Virus stages
Dormant phase Virus is idle.
Propagation phase Virus places an identical copy of itself into other programs or into certain system areas on the
disk.
Triggering phase Virus is activated to perform the function for which it was intended. Caused by a variety of system
events
Execution phase Function is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
REFERENC https://www.slideshare.net/eniam27/stratification-in-the-political-environment
E: https://www.slideshare.net/AltheaTiu1/social-and-political-stratification-125060884