The internet is a public system where every transaction can be tracked, logged, monitored and stored in many places. Therefore, it is essential for a company or an individual who carries out business through the internet be aware of potential security threats that would easily harm their business. The same precaution applies to other individuals who are using the internet.
Online security threat occurs when some of the online users try to attack other online users by exploiting the internet's security loopholes through criminal behaviours. The following are related definitions and some of the harmful security threats on the internet.
Hacker - is the person who breaks into the computer site of the online computer users either for profit or for "challenging their security strength" purposes. Hacking simply means exploiting the vulnerabilities of the operating system.
Malware - is a malicious software program designed to damage the computer system. Examples are viruses (or "worms") and spywares.
Virus - is a form of malware that accesses a computer system by attacking it in order to disable the system or otherwise harming it in other ways with or without the knowledge of the owner. Once a computer has been attacked by viruses, it will automatically spread to all other connected computers if there are no security steps taken.
Spyware - is intended to steal confidential data from the computer users. It can be delivered in different ways such as being attached with legitimate softwares.
Adware - is an advertising-supporting program which automatically displays advertisements on websites in a computer. These advertisements can usually be viewed through pop-up windows.
Trojans - is a malware that is contained in a seemingly harmless program but which gets control of and harms all other programs in a computer.
Phishing - typically means stealing confidential and sensitive personal information of online users by trickery. It is usually carried out by emails.
Keylogger - is a program installed on the computer to monitor each key that a user types on the keyboard. It is usually used to collect secret and personal information such as username, password and credit card information.
.
Security threats are usually transmitted through some of these applications and program vulnerabilities:
-File sharing application
-Instant messaging
-Web servers and services
-Weak passwords
Well, several solutions can be carried out to prevent security threats.
-Don’t open any website links that you receive from unknown users.
-Install firewalls on your gateway computer.
-Never open an email attachment from the unauthorized source.
-Install an up-to-date antivirus program and anti spyware program on your computer.
Click here Security Solutions
Click here Security Solutions
Reference(s):
Security risk on Internet. (n.d.). Retrieved Feb 6, 2011, from http://www.networktutorials.info/advancenetworking/internet-security-threats.html
Security threats to Ecommerce. (n.d.). Retrieved Feb 6, 2911, from http://www.exampleessays.com/viewpaper/54196.html
Security risk on Internet. (n.d.). Retrieved Feb 6, 2011, from http://www.networktutorials.info/advancenetworking/internet-security-threats.html
Security threats to Ecommerce. (n.d.). Retrieved Feb 6, 2911, from http://www.exampleessays.com/viewpaper/54196.html
Is the E-mail considered a type of program vulnerability?
ReplyDeleteS!ok:
ReplyDeleteYes, the E-mail can be considered a type of program vulnerability because it is one of ways through which online threats are transmitted as well.
From my opinion, the level of threat of online security is becoming more and more dangerous. By reducing or limiting the use of online stuff would definitely increase the safety of our personal data.
ReplyDeleteirynlow:
ReplyDeleteYes, you can consider it as a way to prevent security threats but, nowadays, people can hardly live without the internet, in view of the many benefits that are gained by its usage compared to limiting the online experience.