Nt1330 Unit 2 Assignment 2

Words: 759
Pages: 4

CSC2101Information Technologyfor Business 2

Assignment 2: The IT Security

TEE WEN JIE DBM/0417/004

1.What is Data security and Information security?

Data security is the precaution of unauthorized access, use, disruption, modification or destruction of stored data. Information security is the precaution of unauthorized access, use, disruption, modification or destruction about information. Data security is particularly to data in storage. Information security is a more extensive practice involving end-to-end information flows.

2. What is Data privacy?

Data privacy is also named information privacy. Data privacy is a way of information technology that contains the capacity of organizations or individuals to recognize data in a computer
…show more content…
It is a malicious software designed to monitor the victim's computer. The purpose of this Spyware is to understand your daily activities so that attackers can use your information. The second categories of computer security risks are Keylogger. The record of every keystroke you make on the keyboard. Keylogger is a very powerful threat that can steal user login credentials, such as username and password. The third categories of computer security risks are Worms. This is the most harmless threat, and its programming is just to spread it. It won't change your system, but it can be transferred from one computer to another, in a network, or even on the Internet. Because of replication, it will take up your computer hard disk space and take up most of the bandwidth. The fourth categories of computer security risks are Adware. This is a threat, and your computer will pop up a lot of advertising. It can range from non-adult material to adult material, because any advertising can make the owner make money. The fifth categories of computer security risks are Wabbits. It's another threat of self-replication. It does not hurt your system like a virus, and it does not replicate through your LAN like a worm. One example of the Wabbit attack is the fork bomb, which is a form of DDoS