Friday, February 6, 2009

The threat of online security: how safe is our data?

The Internet is a global system of interconnected computer networks that interchange data by packet switching using the standardized Internet Protocol Suite (IP). It is a “network of networks” that consists of million of private and public business, academic and government networks, which carries various information resources and services such as electronic mail, file sharing or file transfer of local to global scope that are linked by wireless connection, copper wires and fiber-optic cables.

What is Internet Security?

What w
as once a small research network, a home for greybeard researchers and future millionaire geeks is now front-page material? When computer connects to a network and begin communicating with others, it is taking a risk. Internet security involves the protection of a computer’s internet account and files from intrusion of an outside user. Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer’s data.

Programs can be mad
e to help your computer, but there are also some types of Internet Threats that user can create with intentions of destroying the computers data by being deceptive.

Trojan Horses: programs which pretend to do one thing, but in reality snoop out your personal data or damage it. These types conceal their identity and are usually quite hard to detect.

(ii) Viruses: programs which are able to log into the personal files on a computer it has affected and as a result, can end up removing all of them. It can have serious sides that will effects on a computers system.

(iii) Malware: also known as Malicious Software. It is software designed to infiltrate or damage a computer system without the owner’s informed consent. Besides, Malware can be classified as Trojans with a limited payload and are often not detected by most antivirus software. They may require the use of other software designed to detect other classes of malware, which including spyware.

(iv) Worms: programs which are able to replicate themselves over a computer network and in turn perform malicious actions. As a resu
lt it has the ability to affect other programs on the computer.

Hackers and How to Protect Yourself

The latest in Internet Security Threats

No comments:

Post a Comment