The Treat of Internet Security: Is our data safe enough? (0)
Thursday, February 05, 2009 by Week 4
, under
The Internet is a worldwide, publicly accessible series of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP).Nowadays, peoples rely on computers to create, store and manage critical information through the internet. Consequently, it is important for users to aware that computer security plays a major role in protecting their data from loss, damage, or even misuse. Similarly, online security has been online trader’s main concern in protecting their websites from potential threats, such as phishing, security hacking, information theft, virus, worms and etc. Besides that, there are also a lot of hackers trying to hack others pc and personal file or even photos.
However, the increasingly developed technologies have increased the risk every computer user faced. Everyone who owns a computer with internet connection is able to equip themselves with ‘hacking’ knowledge by making some research online through the internet. Anyone from the each part of the world may also be able to learn the skills that to hack another persons personal documents or others companies confidential documents.
Many computer users are facing the threats that appear in the internet, such as cybercrime, phishing, internet and network attacks for an example computer viruses, worms and Trojan horses and back doors.Below are the explanation of each threats,
i.)Cybercrime is defined as online or internet-based illegal acts. Hackers, crackers and corporate spies who have advanced computer and network skills access computers and networks illegally with the intent of destroying data, stealing proprietary data and information.
ii.)Phishing is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal information and financial information. For example, some phishing e-mail messages ask you to reply with your information, or a pop up window that looks like a website, that collects the information. The damages caused by phishing can be crucial. The following case illustrates potential threat caused by phishing.
iii.)Virus is a Malicious software that attaches itself to other software. For example, a patched software application in which the patch's algorithm is designed to implement the same patch on other applications, thereby replicating. It replicates within computer system, potentially attaching itself to every software application.
iv.)Worm. It's a malicious software which is a stand alone application. It's often designed to propagate through a network, rather than just a single computer. When your computer is infect of worm, computer will slow starting or slow running. It'll also face unexpected or frequent system failures.
v.)Trojan Horse - It is a Worm which pretends to be a useful program or a Virus which is purposely attached to a useful program prior to distribution. It's same as Virus or Worm, but also sometimes used to send information back to or make information available to perpetrator. Trojan unlike Worms, which self propagate, it's require user cooperation.It is the most famous worm in the internet nowadays and it will also steal your infomation from your pc through the internet.
In conclusion, risk of facing threats are become more common and dangerous. So safeguards developed must be always up to date to enhance the defenses against online security threats. In the same time, users must be educated and informed about the crucial damages and loss caused by imposing online security threats.If we prepare well before we online, we'll be secure and safe from internet threat.
0 Reply to "The Treat of Internet Security: Is our data safe enough?"
Post a Comment