COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Malicious Code
|
|
Authorized Access
|
|
Theft
|
|
System Failure
|
Detailed explanation-1: -Computer security risks can be created by malware, that is, bad software, that can infect your computer, destroy your files, steal your data, or allow an attacker to gain access to your system without your knowledge or authorization. Examples of malware include viruses, worms, ransomware, spyware, and Trojan horses.
Detailed explanation-2: -In cybersecurity, risk is the potential for loss, damage or destruction of assets or data. Threat is a negative event, such as the exploit of a vulnerability. And a vulnerability is a weakness that exposes you to threats, and therefore increases the likelihood of a negative event.
Detailed explanation-3: -What are the risks of unauthorized data access? Once an individual has gained unauthorized access to data or computer networks, they can cause damage to an organization in a number of ways. They may directly steal files, data, or other information. They may leverage unauthorized access to further compromise accounts.