THREAT of online security
Virus is a piece of code that inserts itself into a host, which including the operating system in order to spread over and harm the users computer. Virus attack can damage the operating system, causing the loss of data and other possible losses. In the internet world, there have around 80,000 viruses and everyday will have 25 new viruses be created. The examples of computer viruses are I Love You virus, AutoRun and etc
Worm is a program that copies itself repeatedly. The repeatedly copied files use up the available space and slow down a computer operating speed. The difference between the virus and worm is worm does not need to attach itself to an existing program. For example Wscript.KakWorm spreads using Microsoft Outlook Express. It attaches itself to all outgoing messages using the Signature feature of Outlook Express and Internet Explorer newsgroup reader. Simply reading the received email message causes the virus to be placed on the system.
Trojan House is a program that hides within or looks like a legitimate program. Although they seem to be harmless, they may however be triggered if certain condition is certified. The example of Trojan horse is Trojan Xombe which is the mask as email from Microsoft. The hackers will access to the computer and steal the passwords. Spyware is a stand-alone program that monitors the activity on computer, gathering personal information, such as usernames, passwords, account numbers, files, other confidential information, and even driver’s license or social security numbers without being detected, and sends this information to another computer. Additionally, a user may unknowingly receive spyware by accepting an End User License Agreement from a software program. For example, blogs are being used by hackers to spread spyware, exploiting flaws in publishing tools. Experts say hackers can use JavaScript and ActiveX, common methods for launching programs on webpages, to install spyware on blog visitors’ PCs. Richard Stiennon, chief of technology for Webroot Software, says auto-generated websites such as blogs are a great place for spyware authors to spread their work.
In conclusion, risk exposed by computer users is increasing with the increasing developed technology. Therefore, safeguards developed must be always up to date to enhance the defenses against online security threats. In the same time, users must be educated and informed about the crucial damages and loss caused by imposing online security threats.
Trojan House is a program that hides within or looks like a legitimate program. Although they seem to be harmless, they may however be triggered if certain condition is certified. The example of Trojan horse is Trojan Xombe which is the mask as email from Microsoft. The hackers will access to the computer and steal the passwords. Spyware is a stand-alone program that monitors the activity on computer, gathering personal information, such as usernames, passwords, account numbers, files, other confidential information, and even driver’s license or social security numbers without being detected, and sends this information to another computer. Additionally, a user may unknowingly receive spyware by accepting an End User License Agreement from a software program. For example, blogs are being used by hackers to spread spyware, exploiting flaws in publishing tools. Experts say hackers can use JavaScript and ActiveX, common methods for launching programs on webpages, to install spyware on blog visitors’ PCs. Richard Stiennon, chief of technology for Webroot Software, says auto-generated websites such as blogs are a great place for spyware authors to spread their work.
In conclusion, risk exposed by computer users is increasing with the increasing developed technology. Therefore, safeguards developed must be always up to date to enhance the defenses against online security threats. In the same time, users must be educated and informed about the crucial damages and loss caused by imposing online security threats.
No comments:
Post a Comment