Harware theft and vandalism / software theft
Hardware theft; is the act of stealing computer equipment.

Hardware vandalism; is the act of defacing or destroying computer equipment.

Software theft occurs when someone 1) steals software media, 2) intentionally erases programs, or 3) illegally copies a program.

The first type of software theft involves a perpetrator physically stealing the media that contain the software or the hardware that contains the media, as described in the previous section.

The second type of software theft can occur when a programmer is terminated from, or stops working for, a company.

A license agreement is the right to use the software. That is, you do not own the software. The license agreement provides specific conditions for use of the software, which a user must accept before using the software.

Product activation is conducted either online or by telephone, users provide the software products a 25 character identification number unique to the computer on which the software is installed.

Computer Security Risks
computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

Any illegal act involving a computer generally is referred to as a computer crime.
The term cybercrime refers to online or internet based illegal acts.

The term hacker refers to someone who accesses a computer or network illegally. A cracker is also someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. A script kiddie has the same intent as a cracker but does not have the technical sills and knowledge. A cyberextortionist is someone who uses e mail as a vechile for extortion. A cyberterroist is someone who uses the internet or network to destroy or damage computers for political reasons. This usually requires a team of highly skilled individuals, millions of dollars, and several years of planning.

Would you like to comment?