You are on page 1of 1

gains from selling confidential information.

Disgruntled employees may want


revenge.
Cyberextortionist: is someone who uses e-mail as a vehicle for extortion. These
perpetrators send an organization a threatening e-mail message indicating they will
expose confidential information, exploit a security flaw, or launch an attack that will
ork if they are not paid a sum of money.
Cyberterrorist: is someone who uses the Internet or network to destroy or damage
computers for political reasons. The cyberterroris traffic
control system, electricity-generating companies, or a telecommunications
infrastructure. This is similar to a term called cyberwarfare which describes an
attack whose goal ranges from disabling a s computer network to
crippling a country. Cyberterrorism and cyberwarfare usually require a team of
highly skilled individuals, millions of dollars, and several years of planning.

COMPUTER VIRUSES, WORMS, TROJAN HORSES, AND ROOTKITS


Every unprotected computer is susceptible to the first type of computer security risk
which are computer virus, worm, Trojan horse, and/or rootkit.

Virus: A computer virus is a potentially damaging computer program that affects,


or infects a computer negatively by altering the way the computer works without the
knowledge or permission. Once the virus infects the computer, it can spread
throughout and may damage files and system software, including the operating
system.
Worm: is a program that copies itself repeatedly, for example in memory or on a
network, using up resources and possibly shutting down the computer or network.

You might also like