2. Computer crime refers to any crime that involves a
computer and a network
Cybercrimes are defined as: "Offences that are
committed against individuals or groups of
individuals with a criminal motive
3.
4. Malware is Malicious Software - deliberately
created and specifically designed to damage.
Spam, or the unsolicited sending of bulk email for
commercial purposes, is unlawful to varying
degrees
5. Phishing is a technique used by strangers to "fish"
for information.
Computer fraud is any dishonest misrepresentation
of fact.
It Causes loss of data.
6. Many jurisdictions place limits on certain
speech and ban racist, blasphemous,
politically subversive, libelous or
slanderous, seditious, or inflammatory
material that tends to incite hate crimes.
7. Illegal representation about gender, race,
religion, nationality, sexual orientation.
Any comment that may be found derogatory or
offensive is considered harassment.
4 out of 5 children's are affected in harassment
8. Drug trafficking means to sell their illegal
substances through encrypted e-mail and other
Internet Technology.
These virtual exchanges allow more intimidated
individuals to more comfortably purchase illegal
drugs.
9. Cyber terrorism in general, can be defined as an
act of terrorism committed through the use of
cyberspace
The Yahoo! website was attacked at 10:30 PST on
Monday, 7 February 2000. The attack lasted three
hours. Yahoo was pinged at the rate of one
gigabyte/second.
10. Computer security is a branch of technology known
as information security as applied to computers
and networks.
Trust all the software to abide by a security policy
but the software is not trustworthy (this is
computer insecurity).
11. Hardware based or assisted computer security
offers an alternative to software-only computer
security.
While many software based security solutions
encrypt the data to prevent data from being stolen,
a malicious program may corrupt the data in order
to make it unrecoverable or unusable.
12. One use of the term computer security refers
to technology to implement a secure
operating system.
An example of such a Computer security
policy is the Bell-La Padula model
13. Within computer systems, the two fundamental
means of enforcing privilege separation are access
control lists (ACLs) and capabilities.
Capabilities have been mostly restricted to
research operating systems and commercial OSs
still use ACLs.
14. In 1994, over a hundred intrusions were made by
unidentified hackers into the Rome Laboratory, the
US Air Force's main command and research facility.
Using Trojan horse viruses, hackers were able to
obtain unrestricted access to Rome's networking
systems and remove traces of their activities.
15. Computer security is critical in almost any
technology-driven industry which operates
on computer systems. Computer security can
also be referred to as computer safety. The
issues of computer based systems and
addressing their countless vulnerabilities are
an integral part of maintaining an operational
industry.