The Internet is a global system of interconnected computer networks that interchange data by packet switching using the standardized Internet Protocol Suite (IP). It is a “network of networks” that consists of million of private and public business, academic and government networks, which carries various information resources and services such as electronic mail, file sharing or file transfer of local to global scope that are linked by wireless connection, copper wires and fiber-optic cables.What is Internet Security?
What was once a small research network, a home for greybeard researchers and future millionaire geeks is now front-page material? When computer connects to a network and begin communicating with others, it is taking a risk. Internet security involves the protection of a computer’s internet account and files from intrusion of an outside user. Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer’s data.
Programs can be made to help your computer, but there are also some types of Internet Threats that user can create with intentions of destroying the computers data by being deceptive.
(i) Trojan Horses: programs which pretend to do one thing, but in reality snoop out your personal data or damage it. These types conceal their identity and are usually quite hard to detect.
(iii) Malware: also known as Malicious Software. It is software designed to infiltrate or damage a computer system without the owner’s informed consent. Besides, Malware can be classified as Trojans with a limited payload and are often not detected by most antivirus software. They may require the use of other software designed to detect other classes of malware, which including spyware.
(ii) Viruses: programs which are able to log into the personal files on a computer it has affected and as a result, can end up removing all of them. It can have serious sides that will effects on a computers system.
(iv) Worms: programs which are able to replicate themselves over a computer network and in turn perform malicious actions. As a result it has the ability to affect other programs on the computer.
Hackers and How to Protect Yourselfhttp://www.youtube.com/watch?v=0TkDB4KK1s8
The latest in Internet Security Threats