Online security threats: How safe is our data?

Threats of online security have now become one of the biggest challenges on the Internet. Most security threats are done by opportunistic attackers on any small vulnerabilities.

The online security threats include:

1. Spyware Attacks
Spyware attacks are the most common online security threat faced by Internet users. Spyware is simply a computer program that is aimed to steal information from Internet user’s computer without their knowledge. Common spyware includes Trojan horses, dialers and adware programs. To prevent spyware attacks, we should scan all our files before downloading. Do not download softwares you have never heard of.
(Trojan horse: At first glance it appears to be useful software but it will actually do damage once installed or run on your computer. )

2. Windows remote access services
There are several systems providing remote access methods. Users are able to access personal information from other places also means that an attacker with the right tools can easily take over. It can be useful but it is also dangerous. Firewall protection should be installed to avoid unauthorized access by others.

3. File sharing applications
Often, computer users use file sharing programs to share files. Peer-to-peer (P2P) program is an easy way to share files where files are opened to other participants so that the information can be shared. However, this gives opportunities to hackers to access the computers easily. Most corporations do not use P2P networks since there is the risk of compromised data.

4. Mail client
Hackers use emails to spread viruses and worms by including them as attachments in emails. Delete suspicious files immediately to prevent mail client attacks.

5. Instant messaging (IM)
Most corporations block employees from using IM because it can bring technical threats and lost productivity. File transfers can expose the system to attacks.

References:
http://www.tech-faq.com/online-security-threats.shtml

http://www.wisegeek.com/what-are-the-primary-online-security-threats.htm

0 comments:

Post a Comment

Ab0uT uS

This blog is created for the purpose of our Universiti Tunku Abdul Rahman (UTAR)'s E-Commerce subject for the May 2009 trimester. The 4-week posts will feature various e-commerce related topics. The members are: a new guy in Group 4, a girl whose name sounds 'risky', a 'fat' girl who is not fat, and Gloria the girl who's named after an animated hippo

Followers