Digital Security Risks
At this time of age, almost everyone relies on technology and computers to create, store and manage their personal as well as business information. Thus, it is important that computers and mobile devices, along with the data and information they store, are accessible and available only when needed to authorized persons. It is also the responsibility of that users to take necessary steps to protect their computers, mobile devices, data, and programs from loss, damage, and misuse.
For example, organizations must ensure that sensitive data and information, such as credit card records, employee and customer data, and purchase information is secure. Home users must ensure that their credit card numbers are completely secured when they make an online purchase or sale.
A Digital Security Risk is any action or event that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.
The more common digital security risks include Internet and network attacks, unauthorized access and usage of data, hardware theft, software theft, information theft, and system failure. While some breaches to digital security are accidental, and many are intentional. Some intruders do not interrupt or disturb a computer, just access the data of computers, programs, information, or mobile devices.
Cybercrime
The term cybercrime refers to online or internet-based illegal acts like distributing malicious software or committing identity theft. Any illegal act involving the use of computers or related devices generally is referred to as Computer Crime.
An intentional breach of digital security often involves a deliberate act that is against the law. Software used by cybercriminals sometimes is called crimeware. Today, combating cybercrime is one of the FBI,s top priorities. Perpetrators of cybercrime fall typically into one of the basic categories: hacker, cracker, script kiddie, corporate spy, unethical employee, cyber extortionist, and cyberterrorist.
Hacker
The term hacker although originally a complimentary word for a computer enthusiast now has a derogatory meaning and refers to someone who accesses a computer or network illegally. Some hackers claim the intent of their security breaches is to improve the security of data and information.
Cracker
A cracker also is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious actions. Both hackers and crackers have advanced computer knowledge and network skills.
Script Kiddie
A script kiddie has the same intent as a cracker and hacker but does not have the technical skills and knowledge. Script kiddies often use pre-written scripts for cracking and hacking programs or software to break into computers, mobile devices, and networks.
Corporate Spy
Some corporate spies have excellent computer and networking skills and are hired to break into specific computers and steal their proprietary data and information, or to help identify security risks in their own organization. Unscrupulous companies hire corporate spies, a practice known as corporate espionage, to gain a competitive advantage.
Unethical Employee
Unethical employees may break into their employer's computer for a variety of reasons. Some simply want to exploit a security weakness. Others seek financial gains from selling confidential information. Disgruntled employees may want revenge.
Cyber Extortionist
A cyber extortionist is someone who demands payment to stop an attack on an organization's technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization's network - if they are not paid a sum of money.
Cyber Terrorist
A cyber terrorist is someone who uses the internet or network to destroy or damage a computer for political reasons. The cyberterrorist might target the nation's air traffic control system, electricity generating companies, or telecommunication infrastructure. The term, cyberwarfare, describes an attack whose goal revenges to disabling a government's computer network to cripple a country. Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.
0 Comments