
When a computer connects to a network and begins communicating with others, it is taking a risk. Internet security involves the protection of a computer's internet account and files from intrusion of an unknown user. Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer's data.
Nowadays, threats are becoming more and more sophisticated as recipients of threats are better educated on what to look for. Users are more cautious and this has lead to a rise in more cunning ways to harvest personal information without users’ apparent involvement. Therefore, our data has become unsafe on the internet so it makes the internet users full of fear when surfing the net.
These are the threats that affect the online security:
Computer Virus
A virus is a self-repli

Hacking
Computer hacking involves some degree of violation of the privacy of others, or damage to computer-based property such as files, web pages or software. The impact of computer hacking varies from being invasive and annoying to illegal. In January 2008, P

Hijacking
Online, hijacking refers to the act of obtaining an individual’s personal account information and using it for malicious purposes. An example would be a fraudster getting a hold on someone’s personal credit card information and going on a spending spree. There are many types of hijacking in internet like DNS hijacking, domain hijacking, IP hijacking and page hijacking.
Identify theft
Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social Security number – it can also include credit card and mail fraud. In the online world, electronic commerce information can be intercepted as a result of vulnerabilities in computer security. Besides that, identity theft can also be undertaken on a large scale, as in the case of a company or even a city.
Spyware

There are many examples of spyware, which are CoolWeb search, Zango, Zlob Trojan and Movieland. Zlub Trojan downloads itself to a computer via an ActiveX codec and reports information back to Control Server.
Phishing
Phishing is a form of identity theft whereby scammers send an e-mail that appears to come from a legitimate company with whom the recipient conducts business (such as a bank or payment processing service). Recipients of such e-mails who click through may then unwittingly submit their personal information to the fraudulent site.
At year 2009, there are some top online security threats that everyone can have a look.
Top Online Security Threats for 2009
1 Comment:
There are so many threats to computers nowadays! It is very important to know how to protect our computer! My computer had been attacked by virus before. So I am very becareful to those unknown links and website!
Post a Comment