Hardware Reference
In-Depth Information
Computer security, in an ideal world, lets in the right people
and applications without any hassle, and keeps out the wrong
people and applications. Of course, in the real world, security
systems don't always work that way. Effective computer security is a constant balance
between safety and convenience. In this chapter, you'll learn about the many types of
threats to safety, security, and privacy, both of the physical computer and of its data, and
how to guard against threats and attacks without placing unnecessary obstacles in the way
of legitimate users.
Understanding Hacking
Hacking refers to a variety of computer crimes that involve gaining unauthorized access to
a computer system or its data, usually with the intent of stealing private information from,
or causing harm or embarrassment to, the rightful owner.
The word hacker also has a benign meaning, referring to a computer expert
who is thoroughly familiar with, and enthusiastic about, the inner workings
of a computer system. This meaning is older, but the newer meaning, which
associates the term hacker with criminal activities, is now more prevalent.
Some examples of hacking are as follows:
Gaining remote access to a server
Gaining control of an operating system
Logging in locally and stealing data
Changing a website's content
Gaining access to the contents of a database
Surreptitiously analyzing network traffi c
Introducing software designed to cause harm or steal data
Creating a condition in which a computer or network no longer works well
Modifying existing software so that it no longer performs as it should, or so that it
secretly does harmful things in addition to its usual activity
Stealing passwords
Stealing personal details
Search WWH ::




Custom Search