6 Common Terminologies In Computer Security
When it comes to the issue of security of our properties or our devices, it seems to be an issue that concerns all of us. In this article, I want to talk about six common Terminologies in computer Security. Follow me as we will familiarize ourselves with these terms in this article.
A threat can be seen as an action that has the tendency to violate or compromise computer security. Anything that you do or someone else does that can open up your system to attack is a threat.
Exploit has to do with any breach in computer security that allows people to take advantage of the vulnerability of a system. Let’s say for example you have a weak password on your system or you do not have a password at all and this allows people to steal vital information from your system. That is a typical example of an exploit.
This has to do with the existence of weakness , design or implementation error that can lead to an unexpected, undesirable events that can compromise the security of a system.
#4 Cracker, attacker or intruder
This is an individual who breaks into a system in order to steal or destroy information available on that particular system. Some also like to refer to them as Dark Angels.
Attack is any action derived from intelligent threats that is meant to violate the security of a system.
#6 Data theft
This has to do with any actions that are carried out in order to steal critical information from users system. Most at times, passwords and other vital documents are stolen in order to use the user’s identity to commit crimes.
Now your take on this article…
I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.
Become Part Of our Fan Base on Facebook. Click Here.
Follow Us on twitter. Click Here.
Download Our App. Click Here