In the modern era, we have come to depend on our computers to create, store and handle essential information. Therefore, computer security is extremely important to protect ours data from loss, damage, and misuse. The extent of online security to protect the web site from potential threats has become the main concern of online trader.
Nevertheless, the advancement of technology has increased the risk faced by computer users. Nowadays, anyone can have easy access to tombs of hacking knowledge through the easily available and affordable internet, therefore indirectly increasing the threat to online security.
Computer users are exposure to the threats of cyber crime, phishing, internet and network attacks such as computer viruses, worms and Trojan horses and back doors.
Cyber crime is defined as online or internet-based illegal acts. Cyber criminals include hackers, crackers and corporate spies with advance computer skills who access computers and networks illegally with the intent of destroying data, stealing proprietary data and information.
Phishing is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal information and financial information. For example, some phishing e-mail messages ask you to reply with your information, or a pop up window that looks like a website, that collects the information. The damages caused by phishing can be crucial. In 21 June 2007, a spear phishing incident at the Office of the Secretary of Defense (OSD) stole sensitive U.S. defense information, leading to significant changes in identity and message-source verification at OSD. This incident has cost administrative disruptions and personal inconveniences, as well as huge financial loss in making system recovery.
Internet and network attack that jeopardize security include virus, worm, and Trojan horse. Virus is a piece of code that is secretly introduced into a system in order to corrupt the system or destroy data. Virus attack can damage the operating system, causing the loss of data and other possible losses. A worm is a program that copies itself repeatedly. The repeatedly copied files use up the available space and slow down a computer operating speed. On the other hand, a Trojan horse is a program that hides within or looks like a legitimate program. Although they seem to be harmless, they may however be triggered if certain condition is certified.
A back door is a set of instructions in a program that allow users to bypass security control when accessing a program, computer, or network. Once perpetrators gain access to unsecure computers, they often install a back door or modify an existing program to include a back door, enabling them to continue to access the computers remotely without the user’s knowledge.
Ultimately, safeguards developed must be always up to date to enhance the defenses against online security threats. In the same time, users must be educated and informed about the crucial damages and loss caused by imposing online security threats.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment