Problemas Eticos Del Mundo Actual

Páginas: 6 (1376 palabras) Publicado: 12 de diciembre de 2012
Name:

List #:

Subject: TICS Integrating Activity 2.

Date: 12th –December-2012.

Teacher:

“Introduction”
I am going to talk about the computer system and why some computers have a bad system and any other things, and the security in computers need to be better because in the ears there’s allot of virus only the Macs doesn´t have for now. Computer security is a branch of computertechnology known as information security as applied to computers and computer networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.

“Computer security”
“Threads”
Computer systems are vulnerable to manythreats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centers. Losses can stem, for example, from the actions of supposedly trusted employees defrauding a system, from outside hackers, or from careless data entry clerks. Precision in estimating computer security-related lossesis not possible because many losses are never discovered, and others are "swept under the carpet" to avoid unfavorable publicity. The effect of various threats varies considerably: some affect the confidentiality or integrity of data while others affect the availability of a system.
“Types of threads”
1. Errors and Omissions
2. Fraud and Theft
3. Employee Sabotage
4. Loss of Physical andInfrastructure Support
5. Malicious Hackers
6. Industrial Espionage
7. Malicious Code
8. Threats to Personal Privacy
“Virus”
A computer virus is a small bit of software which is designed to enter your computer by stealth and self-install. Once in place the virus will begin multiplying to other PCs which can be reached through yours as it starts unleashing whatever havoc it was designed to create.A computer virus can either be destructive in that it erases selected files, or entire hard drives, or less destructive in that all it does is send thousands of email messages from your computer to everyone in your address book. In between those two levels are virus types which will look for specific files, such as word processing files, and send those to everyone that you know.

“Type ofvirus”
1. Bootsector Virus
2. Macro Virus
3. Memory Resident Viruses
4. Rootkit Virus
5. Polymorphic Viruses
6. Logic Bombs/Time Bombs
“Hacker”
A hacker is someone who seeks and exploits weaknesses in a computer or computer network. 
“White hat hackers”
People who break into a computer system and inform the company that they have done so. They are either concerned employees or securityprofessionals who are paid to find vulnerabilities. White hat hackers are the "good guys."
“Black hat hackers”
A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers are also known as crackers or dark-side hackers. The general view is that, while hackers build things, crackers break things. They are computersecurity hackers that break into computers and networks or also create computer viruses. The term “black hat” comes from old westerns where the bad guys usually wore black hats and the good guys wore white ones.
“Samurai hacker”
Usually it is someone hired to investigate security breaches, which investigates cases of privacy rights, are protected by the U.S. First Amendment or any other compellingreason that legitimizes such actions. Samurai disdain crackers and all kinds of electronic vandals. They also work to do and tell you how to know about network security systems


“Prehacker”
Prehacker is a slang term that describes the action of experimenting with or manipulating a telephone system. Since prehacker took place before personal computers became popular, it is sometimes...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • problemas eticos del mundo actual
  • problemas éticos del mundo actual
  • Problemas eticos del mundo actual
  • problemas éticos del mundo actual
  • problemas eticos del mundo actual
  • Problemas Eticos Del Mundo Actual
  • PROBLEMAS ETICOS DEL MUNDO ACTUAL
  • Problemas Eticos Del Mundo Actual

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS