Summary |
The goal of computer security is to eliminate or protect against threats. A threat is anything that can cause harm. |
A countermeasure is any step taken to ward off a threat. Countermeasures are meant to protect data and systems from damage. |
Computer use poses several kinds of threats to users. These include the risk of identity theft, the loss of privacy, the exposure to spam, and even physical injuries. |
In identity theft, an ID thief impersonates someone else by using the victim’s name and personal information. |
A successful ID thief can obtain documents and conduct business transactions in the victim’s name. |
Many companies monitor the activities of consumers each day and compile this information for various reasons. |
The growing amount of personal data that is sold and traded among companies – and which is available for individuals to access – raises concerns abort the loss of personal privacy. |
Spam is unwanted, or “junk”, e-mail messages. |
Spam messages are usually commercial in nature and may arrive by the dozens or hundreds in a person’s inbox. |
There are a variety of steps you can take to avoid receiving spam. |
Thursday, February 5, 2009
summary
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment