Thursday, February 12, 2009

The threat of online security: How safe is our data?

Nowadays the technology is getting improved; majority of people can be able to use online service and access to internet. Internet become common in our life because many people use it to search the information, chatting, transferring the file, read the news and so on.


There are few threats that would harm and risky for online users which are:

Accidental Actions

An accidental action is usually the main issue that causes the harm of security. This category encompasses problems arising from basic lack of knowledge about online security concepts and includes issues such as poor password choices, accidental or erroneous business transactions, accidental disclosure, and erroneous or outdated software. Related problems occur as a result of
misconfigured security products and information leakage resulting from insecure information transfers. Education and prudence should be considered key defenses
in limiting the frequency and extent of such events, since this form of cyber vulnerability is largely self-inflicted and avoidable.

Phishing

Phishing is one of the most damaging online security threats in recent times. Basically it involves an attempt by a fraudster, to extract confidential information from the innocent victim. In most cases the fraudster constructs a clone site that looks very similar to the web page of a bank or other financial institution. The victim is urged to click a link on an email and access the victim's financial account. The web link is actually a clone web page that captures the confidential login information of the victim. Once this happens, the fraudster uses the information to log into the actual financial account of the victim. The funds in the account are then syphoned out by the fraudster. We should never click a link to access to our bank account, credit card account or any other financial account. To avoid from it, open up a fresh browser window and type the entire name of the website, this is the safest way.

Worm

A worm is also a man-made program that replicates itself. However, unlike a virus, it does not infect other program files on the computer. Instead, a worm spreads itself automatically to other computers through email, over a network and via Internet Relay Chat (IRC). If we get infected by worm, worm can either disable the computer, Add, modify or delete files or reformat the hard disk or steal addresses held in our computer to send on virus-infected emails to our friends, colleagues, clients or customers and also send spam to those people which in our mail address.

Trojan Horse

Although Trojan horse programs are categorized as viruses, they are not true viruses, since they do not replicate. Trojans are one of the sneakiest of the online risks. They are often downloaded on the back of a free program (freeware) that has some value to the user -- a free game, software program or music, for instance. A Trojan installed on a computer allows that PC to be entered via a 'backdoor' by any remote user that has the access code to the Trojan. The remote attacker can enter the computer undetected, when the user is online, to access or destroy any information stored. Alternatively, the Trojan can be programmed to automatically send any information on our PCs back to the attacker. This could include,
Client or customer information or other business data
Credit card details
Passwords for access to your online bank, ISP or web services
Information you would rather remain hidden
Email addresses, which may be used for spamming
Children's names, photographs, ages or other personal details held on the computer
Distributed Denial of Service (DDOS) attack on other computers via the victim's computer

Hacker/Cracker
The term "hacker" is a misused term. We should really be referring to a "cracker" to describe those who break security on a computer system. The original term "hacker" refers to computer enthusiasts who enjoy learning everything about a computer system. Crackers run programs that scan computer ports over the Internet to work out which ports are accessible. If our computer shows up in one of these scans, the cracker may decide to enter our PC.

No comments:

Post a Comment