Friday, June 26, 2009

A review on a post on Internet Security from My E-Commerce blog http://ecommerze.blogspot.com/search/label/Internet%20Security




















After review the blog, it has alerted me to be more careful when performing the online activities. When we switch on our personal computer or laptop and connect to the internet and perform some online activities, there is always a risk that our computer will be hacked, vulnerable to viruses, worm or Trojan. In e-commerce world, actions should be taken to prevent computer from these threats as it involves business mainly in the online world. Neglect in internet security can lead to loss of personal data or hacker will hack to the company database to steal the information that is crucial to the company. First, we should be familiar with the threat and attack in order to protect our computer from threats.

There are two main types of attack and threats. One is known as technical attack and the other one is known as non technical attack. The example of the non-technical threat is ‘phising’ which the attacker will use the social pressure to trick the user to reveal their personal information such as credit card or bank account number. This technique is usually involved by sending e-mail to trick the user. For example, the attacker will send a bank notice that have been manipulated and states that they need the user’s information to safeguard their account due to certain reason. Then the user will provide their personal data with no doubt as it looks real.


Most of us are familiar with worms and viruses and these are the type of technical attacks. Besides that, non-technical attack also consists of Denial-of service (DOS) attack, Distributed denial of service (DDoS) and Trojan horse.


Denial-of service (DOS) attack
This is attack uses software by sending a floor of data packets to the user computer with the purpose of overloading its capacity. This can cause the network to shut down and making it impossible for user to access.

Distributed denial of service (DDoS)
It is similar to DOS attack which send request to bombard the system until it not responding. The different of DDos is the attacker will illegally access to several computer and send request while DOS only using one computer.

Trojan horse
This is a program that appear to be useful function as it actually hidden a harmfu
l function that can be harmful for your computer.


What can we do to aVoid those threat and attack?

Access control
The very first thing is to protect the physical asset which is your personal computer, laptop, hand phone and so on. It is also important to determine that who can actually access to the webpage. Besides that, avoid using password that is something related to you and known by other people such as your name or the date of the birthday.
Biometric system such as finger print, iris scanner can also take into consideration as the interest of this system is increasing.

Anti-virus and anti-spyware software
Anti-virus software can scan and protect the system by remove viruses, worm and also Trojan horse while anti- spyware can also removes Trojan horse which often include hidden inside of freeware product and services.

Firewall
Firewall act like a filter where the network must pass. It can protect the system against remote login, viruses, spam and others.

Key encryption
This is the process of encrypts the message in the ways that are difficult, expensive and time consuming. This can prevent an unauthorized people to decrypt the message easily.

No comments:

Post a Comment