Thursday, February 5, 2009

The threat of online security:How safe our data?

Nowadays, people is getting more rely on Internet, without that, people can't find their important data, check information and stored their data. But sometimes the websites are not so safety for the users to use. There are some types of threat of online security that the user facing during they surf Internet such as computer viruses, distributed denial of service attacks, worms, Trojan horse and phishing.

Computer viruses is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. A true virus is only can spread from one computer to another when its host is taken to the target computer, for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD or USB drive. Sometimes users will confuse viruses with computer worms and Trojan Horse but it is totally different.

Distributed denial of service attacks(DDoS Attack) is an attempt to make a computer resource unavailable to its intended users. Although a Denial of service does not usually result in the theft of information or other security loss, it can cost the target person or company a great deal of time and money. Typically, the loss of service is the inability of a particular network service is the inability of a particular network service, such as e-mail, to be available or the temporary loss of all network connectivity and services. A denial of service attack can also destroy programming and files in affected computer systems.

Worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes and it may do so without any intervention. Worm unlike virus because it does not need to attach itself to an existing program. Worm almost always cause at least some harm to the network, if only b consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Trojan horse is a form of malware that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to he host machine. Trojan horse payloads are almost always designed to cause harm but it can also be harmless. There have many types of Trojan horse payloads such as server Trojan, downloader.

Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as user name, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.Phishing is typically carried out by e-mail or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

In conclusion, users online have advantages and disadvantages . If you have prepare some anti-virus software, this will have lesser Internet threat and you can online happily.

0 comments:

Post a Comment