
The potential online security threats that can be discovered are listed as follows:
Cybercrime is defined as online or internet-based illegal acts. This may occur when hackers, crackers and corporate spies access computers and networks illegally with the intent of destroying data, stealing proprietary data and so on.
Besides that, Phishing is a scam in which a perpetrator sends an official looking e-mail that attempts to gain your personal information and financial information. For instance, some phishing e-mail messages ask you to reply with your information, or a pop up window that looks like a website that collects the information. The damages caused by phishing can be serious. The following case depicts the online security threat that is caused by phishing.
In 21 June 2007, a spear phishing incident at the Office of the Secretary of Defense (OSD) stole sensitive U.S. defense information, leading to significant changes in identity and message-source verification at OSD. This incident has cost administrative disruptions and personal inconveniences, as well as huge financial loss in making system recovery.
On the other hand, Internet and network attack that jeopardize online security include virus, worm, and Trojan horse. Virus is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Virus attack can damage the operating system, causing the loss of data and other possible losses. Furthermore, worm can be expressed as a program that copies itself repeatedly. The repeatedly copied files use up the available space and slow down a computer operating speed. In addition, Trojan horse refers to a program that hides within or looks like a legitimate program. Regardless they seem to be harmless, they may however be triggered if certain condition is certified.
Last but not least, back door is a set of instructions in a program that allows users to bypass security control when accessing a program, computer, or network. Once perpetrators gain access to unsecured computers, they often install a back door or modify an existing program to include a back door, enabling them to continue to access the computers remotely without the user’s knowledge.
As a conclusion, online security threats are very real, but if you know how you become vulnerable, you will be able to better protect yourself. You should be able to get online without constantly worrying, and you can! In other words, data safeguards developed must be always up to date in order to increase the defenses against online security threats. At the same time, computer users must be educated and equipped for the information of the crucial damages and losses that caused by imposing online security threats.
References:
http://www.govexec.com/story_page.cfmarticleid=39456
http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history
It is really danger if private information exposes on the internet without any security.
ReplyDelete