One of the biggest challenges on the internet is online security threats. The risk of computer user faced increase as the technologies on internet continue grows. Some website is not safety for users to use because people are created malicious program such as computer viruses, worms, Trojan horses and spyware. Undoubtedly, online security has been online trader’s main concern in protecting their website from potential threats.
Following are some major threats of online securities:
Phishing: (http://en.wilipedia.org/wiki/phishing)
Phising is a scam in which a perpetrator sends an official looking e-mail that attempts to get your personal information and financial information. It uses some ruse to trick users into revealing information or performing an action that compromise a computer or network in order to gain unauthorized access to system or information.
Accidental action
Accidental action consists of problems that arising from basic lack of knowledge about online security concepts and it contribute to a large number of computer securities risks.
Examples of accidental action include poor password choices, accidental or erroneous business transaction and erroneous or outdated software.
Malicious attacks
Defined as an attacks that specifically aim to do harm by malicious code and those caused by intentional misrepresentation. It consists of computer viruses, denial of services attack, and distributed denial of service attack.
(i) Computer viruses
Is a fragment of software code that insert into a host which including the operating system to spread over and damage the computer users. Today, around 80000 of viruses are discovered and 25 new viruses have been created everyday. Examples of computer viruses are I Love You virus, and AutoRun
(ii) Denial of services attack (DOS)
Is another form of malicious code, which is carefully crafted and executed. DOS growing in sophistication, attacks one computer following by another.
(iii) Distributed denial of service attacks (DDOS)
The use of multiple computers in a highly organized attack is known as DDOS. DDOS attacks functions by overwhelming a server with a deluge of message that appear to be normal. The DDOS attacker strategically builds an army of key players including:
1. One client machine for coordinating the attack.
2. Three to four host machines, which are battlefields under the attacker's direct control.
3. Potentially hundreds of broadcasters, which are the legions that run the code to generate the flood of packets that attack a target system (consisting of at least one machine). Broadcasters are recruited by port scanning software that determines the machines on which the attacker can gain root privileges. On these machines, the attacker can embed hidden programs that wait for instructions from the Host machines.
Following are some major threats of online securities:
Phishing: (http://en.wilipedia.org/wiki/phishing)
Phising is a scam in which a perpetrator sends an official looking e-mail that attempts to get your personal information and financial information. It uses some ruse to trick users into revealing information or performing an action that compromise a computer or network in order to gain unauthorized access to system or information.
Accidental action
Accidental action consists of problems that arising from basic lack of knowledge about online security concepts and it contribute to a large number of computer securities risks.
Examples of accidental action include poor password choices, accidental or erroneous business transaction and erroneous or outdated software.
Malicious attacks
Defined as an attacks that specifically aim to do harm by malicious code and those caused by intentional misrepresentation. It consists of computer viruses, denial of services attack, and distributed denial of service attack.
(i) Computer viruses
Is a fragment of software code that insert into a host which including the operating system to spread over and damage the computer users. Today, around 80000 of viruses are discovered and 25 new viruses have been created everyday. Examples of computer viruses are I Love You virus, and AutoRun
(ii) Denial of services attack (DOS)
Is another form of malicious code, which is carefully crafted and executed. DOS growing in sophistication, attacks one computer following by another.
(iii) Distributed denial of service attacks (DDOS)
The use of multiple computers in a highly organized attack is known as DDOS. DDOS attacks functions by overwhelming a server with a deluge of message that appear to be normal. The DDOS attacker strategically builds an army of key players including:
1. One client machine for coordinating the attack.
2. Three to four host machines, which are battlefields under the attacker's direct control.
3. Potentially hundreds of broadcasters, which are the legions that run the code to generate the flood of packets that attack a target system (consisting of at least one machine). Broadcasters are recruited by port scanning software that determines the machines on which the attacker can gain root privileges. On these machines, the attacker can embed hidden programs that wait for instructions from the Host machines.
In a nutshell, increasing developed technology has increased the risk exposed by computer users. Hence, safeguards developed must be always up to date to enhance the defenses against online security threats. At the same time, users must be educated and informed about the crucial damages and loss caused by imposing online security threats. There is some ways to prevent or minimize the risk of lost of data such as installing anti-virus software and a firewall program.
For more information needed please visit:
http://free.avg.com/
http://www.kaspersky.com/
http://www.govexec.com/story_page.cfm?articleid=39456http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history
http://free.avg.com/
http://www.kaspersky.com/
http://www.govexec.com/story_page.cfm?articleid=39456http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history
1 comments:
2day computer play the vital role in our daily life...but the security online threats is getting worse..our data will not be safe in future
Post a Comment