120 likes | 301 Views
Computer Security and Risks - Phishing, Viruses, Corporate Espionage . BY: LIA CARLSON AND CHRISTINA DEL PINO. Why is it Important to Have Computer Security? . People can hack into your computer Strangers can read your emails People can look at the information that is on your computer
E N D
Computer Security and Risks - Phishing, Viruses, Corporate Espionage BY: LIA CARLSON AND CHRISTINA DEL PINO
Why is it Important to Have Computer Security? • People can hack into your computer • Strangers can read your emails • People can look at the information that is on your computer • People can use your computer to attack other systems
Why Would Someone Want to Hack onto Your Computer? • Hackers want to gain control of your computer • Hackers can launch attacks on other computer systems. • Your computer can hide their location of where they’re launching the attack • Hackers gain access to your file
What is Phishing ? • Phishing is the criminally deceptive process of attempting to obtain information such as: • usernames • passwords • credit card details • Phishing is typically carried out by email or instant messaging
This is what a Phishing E-mail Looks Like • Don’t be fooled if it looks like the email is from a co-worker! • Phishing scams rely on placing links in your email from services you trust • Phishing can also be used on: websites and instant messaging
A Virus is a software program capable of reproducing itself • It is capable of causing great harm to files or other programs • Some different kind of viruses are: • File infectors • System or boot record infectors • Macro viruses
Three Main Classifications of Viruses: • File infectors-attach themselves to program files. • System or boot-record infectors- they infect executable codes found in certain system areas on a disk. • Macro-Viruses- most common viruses. Infects Microsoft word and inserts unwanted words.
What is Corporate Espionage? • Individuals/corporations use any means to acquire data • They hope this will give them competitive advantages over competitions. • Companies hire military and government agents to use their spying techniques
What Data are They Collecting? • Customer Information • Patents in progress • Latest research and development • Future plans and markets
Social and Ethical Issues: • Is it right that people’s personal information is accessible? • Is it fair that hackers are stealing other companies secrets and not necessarily being punished?