Computer Security and Safety
Computer Security and Safety
Web or Theft of
Software Denial of Computers or
Applications Service 26% Storage Devices
Exploited 35% 25%
▪ Increasing Complexity Increases Vulnerability
▪ As the computing world become much more
complex, the possibility of security breach
increases.
Insiders are not necessarily employees; they can also be consultants and contractors.
Malicious insiders are extremely difficult to detect or stop because they are often authorized to access the very
systems they abuse.
To counter this: company perform thorough background check, establish psychological and drug testing a
routine, carefully limit the number of people who can perform sensitive operations.
▪ Typical motive: Gain financially and/or disrupt company’s information systems
and business operations
▪ Industrial Spies - use illegal means to obtain trade secrets from competitors of
their sponsor.
▪ Industrial Espionage involves using illegal means to obtain information not available in
public.
▪ a wiretap on the phones of key company officials, bug a conference room, or break into a
research and development facility to steal confidential test results.
▪ Industrial espionage can involve the theft of new product designs, production data,
marketing information, or new software source code.
Typical Motives: Capture trade secrets and gain competitive advantage
▪ Cyber Criminal - are motivated by the potential for
monetary gain and hack into corporate computers to steal
▪ Engage in stealing and reselling credit card numbers,
personal identities, and cellphone IDs
▪ Common ploy is the use of stolen credit card information.