TAILIEUCHUNG - Lecture Introduction to computing - Lecture 30

The contents of this chapter include all of the following: Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators; describe threats and countermeasures; identify threats to users, hardware and data;. | CSC 101 Introduction to Computing Lecture 30 Dr. Iftikhar Azim Niaz ianiaz@ 1 1 Last Lecture Summary I System Development Life Cycle Phases Ongoing Activities Project Management, Feasibility, Documentation Planning Review, approve and prioritize project requests Analysis Preliminary Investigation, Detailed analysis Design Acquire Hardware and software, Develop details Implementation Develop programs, install and test new system Operation, Support and Security Maintenance Activities, System performance and security 2 2 Last Lecture Summary II Program Development Life Cycle Analyze requirements Review requirements, develop IPO charts Design solution Design solution algorithm, Structured and OOP Flowchart and Pseudo code Validate design Inspection and Desk check Implement design Program development tool, writing code Test solution Testing and Debugging Document solution Review Program code and documentation 3 3 Objectives Overview Computer Security Risk A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability Any illegal act involving a computer generally is referred to as a computer crime A cybercrime is an online or Internet-based illegal act Categories of Cybercrime Hacker refers to someone who accesses a computer or network illegally Some hackers claim the intent of their security breaches is to improve security Cracker also is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action Both hackers and crackers have advanced computer and network skills Script kiddie has the same intent as a cracker but does not have the technical skills and knowledge often use prewritten hacking and cracking programs to break into computers Categories of Cybercrime Corporate spies have excellent computer and networking skills and are hired to break into a specific computer and steal

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.