Nowadays, the internet activities like e-commerce are become more popular in our country; it brings a lot of advantages to the users, such as instant delivery and cheaper products and services. However, in some cases the organizations are experience cyber attacks from inside and outside of the organization.
The threat of online security includes viruses, phishing, Trojan horse, denial of service attacks (DOS), hacker, cracker, and identity and data theft. Virus is a piece of software code that inserts itself into a host, including the operating systems to spread over and harm our computer. Anti-virus software can help to prevent viruses by scanning new files and emails, and also check existing files and folders regularly. Different viruses need different removal methods, users should get a suitable virus scanner to help them.
Phishing is a technique used by those attackers to gain other personal information such as account numbers and password through fraudulent email messages. Trojan horse is a program that appears to have a useful function but contains a hidden function that presents a security risk, it will try to plant virus into the computer. Spyware is the software that can monitor online activity and sends information to a remote server.
Denial of service attacks is an attack on website in which attacker uses specialized software to send a flood of data packets to the target computer with the bad intentions. It becomes more sophisticated compare to the previous years; it starts to involve multiple computers to attack another computer. Hacker is individual who intends to gain unauthorized access to a computer system. However, cracker is individual who intends to gain unauthorized access to a computer system with criminal intentions.
The threat identity and data theft is a major form of online fraud, it becomes more common nowadays. Attackers will try to get other personal information such as credit card numbers to apply for the loans, purchase products through the internet and so on.
As a conclusion, as a user we need a good back up system to safeguard our data. Anti-virus software also needed for the scanning process, users should update it regularly in order to ensure its effectiveness.
The threat of online security includes viruses, phishing, Trojan horse, denial of service attacks (DOS), hacker, cracker, and identity and data theft. Virus is a piece of software code that inserts itself into a host, including the operating systems to spread over and harm our computer. Anti-virus software can help to prevent viruses by scanning new files and emails, and also check existing files and folders regularly. Different viruses need different removal methods, users should get a suitable virus scanner to help them.
Phishing is a technique used by those attackers to gain other personal information such as account numbers and password through fraudulent email messages. Trojan horse is a program that appears to have a useful function but contains a hidden function that presents a security risk, it will try to plant virus into the computer. Spyware is the software that can monitor online activity and sends information to a remote server.
Denial of service attacks is an attack on website in which attacker uses specialized software to send a flood of data packets to the target computer with the bad intentions. It becomes more sophisticated compare to the previous years; it starts to involve multiple computers to attack another computer. Hacker is individual who intends to gain unauthorized access to a computer system. However, cracker is individual who intends to gain unauthorized access to a computer system with criminal intentions.
The threat identity and data theft is a major form of online fraud, it becomes more common nowadays. Attackers will try to get other personal information such as credit card numbers to apply for the loans, purchase products through the internet and so on.
As a conclusion, as a user we need a good back up system to safeguard our data. Anti-virus software also needed for the scanning process, users should update it regularly in order to ensure its effectiveness.
No comments:
Post a Comment