Professional Documents
Culture Documents
A. Threats
b) File virus
They attach themselves to files
c) Hoax virus
Come as emails with an attractive subject and launches itself when the
email is opened
d) Trojans
They perform undesirable activities in the background without user
knowledge
e) Worms
It sticks in the computer memory
f) Back doors
May be a Trojan or a worm that allow hidden access to a computer system
Sources of viruses
a) Pirated software’s
b) Contact with contaminated storage medias e.g. flash disk memory cards
floppy disks etc
c) Freeware and shareware
d) Infected proprietary software’s
e) Updates of software distributed via network
Virus symptoms
iv. Theft
Theft plays a significant role in the loss or damage of data. Theft of data happens
within an organization with authorized personnel’s stealing data for one reason or
another
B. Computer crimes
It’s the illegal access, altering or duplication and use of data or information without the
consent of the legitimate owner.
They include
a) Trespass
This is the act of gaining access or entering into a computer system
without legal permission
b) Hacking
This refers to intention breaking of codes and passwords to gain
unauthorized access to computer system, data and information files. This
is done by a person called a hacker
c) Tapping
In this crime, a person sends an intelligent program on a host computer
that sends him information from the computer.
d) Cracking
This refers to the use of guess work over and over again by a person until
he /she finally discovers a weakness in the security policies or code of
software
g) Sabotage
This is illegal destruction of data and information with the aim of crippling
services delivery or causing a great loss to an organization
h) Alteration
This is illegal changing of data and information without permission with
an aim of gaining or misinforming the authorized users
b) Data encryption
Data being transmitted over a network can be protected from unauthorized
access by mixing it up into a form that only the sender and the receiver
can be able to understand by reconstructing the original message from the
mix
c) Log files
They are special system files that keep a record (log) of events on the use
of the computer and the resources of the information system. The
information system administrator can therefore easily track who accessed
the system, when, and what they did on the system
d) Firewalls
It’s a device or a software system that filters the data and information
exchanged between different networks by enforcing the host and control
access policy. Firewall monitor and control access to and from protected
networks