
Most of us are familiar with worms and viruses and these are the type of technical attacks. Besides that, non-technical attack also consists of Denial-of service (DOS) attack, Distributed denial of service (DDoS) and Trojan horse. ☠ Denial-of service (DOS) attack
This is attack uses software by sending a floor of data packets to the user computer with the purpose of overloading its capacity. This can cause the network to shut down and making it impossible for user to access.
☠ Distributed denial of service (DDoS)
It is similar to DOS attack which send request to bombard the system until it not responding. The different of DDos is the attacker will illegally access to several computer and send request while DOS only using one computer.
☠ Trojan horse
This is a program that appear to be useful function as it actually hidden a harmfu
l function that can be harmful for your computer.What can we do to aVoid those threat and attack?
❤ Access control
The very first thing is to protect the physical asset which is your personal computer, laptop, hand phone and so on. It is also important to determine that who can actually access to the webpage. Besides that, avoid using password that is something related to you and known by other people such as your name or the date of the birthday.
Biometric system such as finger print, iris scanner can also take into consideration as the interest of this system is increasing.
❤ Anti-virus and anti-spyware software
Anti-virus software can scan and protect the system by remove viruses, worm and also Trojan horse while anti- spyware can also removes Trojan horse which often include hidden inside of freeware product and services.
❤Firewall
Firewall act like a filter where the network must pass. It can protect the system against remote login, viruses, spam and others.
❤ Key encryption
This is the process of encrypts the message in the ways that are difficult, expensive and time consuming. This can prevent an unauthorized people to decrypt the message easily.






is an e-mail fraud method by sending faked e-mail or instant messages in order to purloin the personal or financial information of recipients. Typically, the e-mail is come from the legitimate or well-known website. The e-mail will require recipients to verify their personal information or account detail such as password, credit card and bank account number or suggest victims to update the services, to badger the users visit their website through the hyperlink provided in the e-mail. The goal of the sender is for victim to disclose personal or account related information.




Technology of internet is continuing grow rapidly where everyone no matter old or young also gain access through internet. People tend to use internet for the business transaction, information sharing, surfing net and etc. However, there is a risk where some websites contains some malicious program such as virus, worms, trojan house and spyware. Therefore, the online security is very important to prevent the data from loss, damage and misuse.
Worm is a program that copies itself repeatedly. The repeatedly copied files use up the available space and slow down a computer operating speed. The difference between the virus and worm is worm does not need to attach itself to an existing program. For example Wscript.KakWorm spreads using Microsoft Outlook Express. It attaches itself to all outgoing messages using the Signature feature of Outlook Express and Internet Explorer newsgroup reader. Simply reading the received email message causes the virus to be placed on the system.
Spyware is a stand-alone program that monitors the activity on computer, gathering personal information, such as usernames, passwords, account numbers, files, other confidential information, and even driver’s license or social security numbers without being detected, and sends this information to another computer. Additionally, a user may unknowingly receive spyware by accepting an End User License Agreement from a software program. For example, blogs are being used by hackers to spread spyware, exploiting flaws in publishing tools. Experts say hackers can use JavaScript and ActiveX, common methods for launching programs on webpages, to install spyware on blog visitors’ PCs. Richard Stiennon, chief of technology for Webroot Software, says auto-generated websites such as blogs are a great place for spyware authors to spread their work.


