domingo, 29 de julio de 2018

Descripción


Conclusión

En conclusión este blogg trata de la seguridad informática, como sabemos que los hackeos hoy en día son muy comunes, entonces tenenos que estar al tanto de todo eso, sabernos informar bien y poder proteger nuestras cuentas, ya que existen intrusos que pueden tomar nuestra información personal, hay que tomar en cuenta todos los consejos y todo lo que dice este blogg, esperando que pueda ayudar en mucho a proteger su información.
En este blogg se presentan importantes temas, como los actos de vandalismo y seguridad informatica, hay que tomar en cuenta todo lo que dice en este blogg para poder prevenir cualquier daño a nuestra información.




Ahora una pregunta........ Dejen sus comentarios♡

¿Con sus palabras, que creen que es seguridad informática?
Deliberate Act of Trespass

  •   unauthorized access to info.
  •      that an organization is trying to protect   low-tech: shoulder surfing high-tech: hacking.       

INFORMATIC SECURITY


Guarantee the integrity, availability and privacy of the information contained in a computer system


Allow the distinction of classes of users, with different authorizations on the use of system resources

Computer security is a broad subject, covering among other things: the work modes of people, the physical security devices and the internal security of the machine and the operating system.

External security: referring to the facilities of the computer system and the access of people to the system and its information.

Contemplate these two areas:

 Physical security. Of the facilities. It includes measures for the prevention or recovery of accidents, and control of access to the system.

 Operational safety Security policies and mechanisms: levels of authorization or responsibility, access methods, communication protocols ...

Internal security: the one that refers to the circuitry of the system, or security issues of the operating system.

PROTECTION: Part of the internal security related to access control of programs, processes or users to the resources of a computer system.

 Types of threats

against the integrity of the system


 Negligent or incorrect use

 Claims (physical damage to the system)

 Unauthorized or improper use

 Sabotage (deliberate act of altering the functioning of the system)

These threats can be accidental or intentional.

Intrusion: Unauthorized or improper entry into the system. Also called penetration.

martes, 24 de julio de 2018

Deliberate Act of Sabotage or Vandalism



         Deliberate Act of Sabotage or Vandalism
acts aimed to destroy an information
asset and, ultimately, damage the
image of an organization
example: hackers accessing a system and damaging
or destroying critical data



Vandalism:
refers
to the total or partial voluntary destruction of public or
private
property. It includes concepts such as damage to heritage,
graffiti
or acts of provocation or activism, such as culture jamming
or
different types of actions on the internet, such as billboard
hacking
or defacement of websites. Vandalism can also be considered a
form
of social protest, as the proponents of the broken windows
theory,
James Q. Wilson and George L. Kelling, point out, as soon as
community
barriers are relaxed by actions that signal that Nobody
cares,
vandalism can occur.
Although
it lapses in some of its concepts with those of iconoclasm, unlike
this,
also a destructive public act, vandalism tends more to be
random or
meaningless and it seems that, at least in some cases,
vandals
enjoy somehow of the vandalic act, either because it is a
sample of
its capacity to damage and destroy or even to verify the
reaction
that its actions produce in others.

Sabotage: Damage or deterioration in facilities, products, etc., is done as a procedure to fight against employers, against the State or against occupation forces in social or political conflicts.
sabotage affects the area of ​​informatics because credentials or personal data are in danger, as there are many people wanting to do damage, in the area of ​​information technology, banks and businesses are affected as they have personal data of their clients and also for can steal money, this is common and that is why you have to have a good security system.
SABOTAJE INFORMÁTICO

jueves, 19 de julio de 2018


               Deliberate Act of Info. Extortion / Blackmail



Blackmail:
Blackmail It is the threat of public defamation or any other damage to obtain some pecuniary or material gain from someone or force him to act in a certain way.
Blackmail or extortion is a crime in the legal system.



Extortion:
Extortion is a crime consisting of forcing a person, through the use of violence or intimidation, to make or omit a legal act or business with profit motive and with the intention of producing a damage of patrimonial character or of the subject passive, well of a third party.



                                             Hacker
It is every individual who is dedicated to programming enthusiastically, that is, an enthusiastic expert of any kind, "who believes that making information available to everyone is an extraordinary asset.
Resultado de imagen para hacker gif



Examples
  • Theft of data files containing customer credit card information
  • hackers accessing a system and damaging or destroying critical data
Resultado de imagen para hacker



                         Security threat 
Any action/inaction that could
cause disclosure, alteration, loss, damage or
unavailability of a company’s/individual’s assets
In computer security, a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.
A threat can be either "intentional" (i.e. hacking: an individual cracker or a criminal organization) or "accidental" (e.g. the possibility of a computer malfunctioning, or the possibility of a natural disaster such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.


 There are three components of threat:
Targets:
organization’s asset that might be attacked information(its confidentiality, integrity, availability),software,
hardware, network service, system resource, etc.
  Agents:
people or organizations originating the threat,intentional or non-intentional employees, ex-employees, hackers, commercial rivals, terrorists,criminals, general public, customer.


Events:
type of action that poses the threat misuse of authorized information, malicious / accidental alteration of information, malicious / accidental destruction of information, etc.



Descripción