Computer Security

Páginas: 2 (438 palabras) Publicado: 4 de octubre de 2012
Integrating Activity
"Computer Security"


Introduction:

Computer security is a branch of computer technology known as information security as applied to computers and networks. The objectiveof computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive toits intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering orcollapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computertechnologies because of its somewhat elusive objective of preventing unwanted computer behavior instead of enabling wanted computer behavior.




Concepts:

-Hacker: Term used by some to mean “a cleverprogrammer” and by others, especially those in popular media, to mean “someone who tries to break into computer systems”.

-Phishing: E-mail fraud method in which the perpetrator sends outlegitimate-looking email in an attempt to gather personal and financial information from recipients.

-Pharming: scamming practice in which malicious code is installed on a personal computer or server,misdirecting users to fraudulent Web sites without their knowledge or consent.

-Cryptology: The art of protecting information by transforming it (encrypting it) into an unreadable format, calledcipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text.

-Trojan: program in which malicious or harmful code is contained inside apparently harmlessprogramming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.

-Worm: malicious program that can replicate and...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Security
  • Security
  • security
  • Security
  • Security
  • Database security
  • Security Vocabulary
  • Penta Security

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS