安全使用计算机事例,计算机安全案例分析.ppt
您所在位置:網(wǎng)站首頁 > 海量文檔
 > 資格/認證考試 > 安全工程師考試
計算機安全案例分析.ppt35頁
本文檔一共被下載:次,您可全文免費在線閱讀后下載本文檔。
下載提示
1.本站不保證該用戶上傳的文檔完整性,不預(yù)覽、不比對內(nèi)容而直接下載產(chǎn)生的反悔問題本站不予受理。
2.該文檔所得收入(下載+內(nèi)容+預(yù)覽三)歸上傳者、原創(chuàng)者。
3.登錄后可充值,立即自動返金幣,充值渠道很便利
Computer English II Unit 13 Computer Security Content Threats to Computer Security Measures to Protect Computer Security I. Threats to Computer Security Threats to computer security are computer crimes (including virus and electronic break-ins) and natural and other hazards. 1. Computer Criminals A computer crime is an illegal action in which the perpetrator uses special knowledge of computer technology. Computer criminals are of four types: I. 1.Computer Criminals (1)Employees The largest category of computer criminals consists of those with the easiest access to computers —— namely, employees. Sometimes the employee is simple trying to steal something from the employer —— equipment, software, electronic funds, proprietary information, or computer time. Sometimes the employee may be acting out of resentment and is trying to “get back” at the company. I. 1.Computer Criminals (2)Outside Users Not only employees but also some suppliers or clients may have access to a company’s computer system. Examples are bank customers who use an automatic teller machine. Like employees, these authorized users may obtain confidential passwords or find other ways of committing computer crimes. I. 1.Computer Criminals “Hackers” and “Crackers” Some people think of these two groups as being the same, but they are not. Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes. They may intend to steal technical information or to introduce what they call a “bomb” —— a destructive computer program —— into the system. I. 1.Computer Criminals (4)Organized Crime Organized crime has discovered that computers can be used just like legitimate business people use them, but for illegal purposes. For example, computers are useful for keeping track of stolen goods or illegal gambling deb
發(fā)表評論
請自覺遵守互聯(lián)網(wǎng)相關(guān)的政策法規(guī),嚴禁發(fā)布色情、暴力、反動的言論。
用戶名:
驗證碼:
匿名?
發(fā)表評論
總結(jié)
以上是生活随笔為你收集整理的安全使用计算机事例,计算机安全案例分析.ppt的全部內(nèi)容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: 小甲鱼python课后题简书_Pytho
- 下一篇: swiper.js pagination