Post by Jaeme, 26 June 09 @ 9:10pm

The internet enables users to access to the internet to get more information. No matter where you are, you can easily access to the internet to get any type of information you want. This creates a significant amount of risk as there are many kinds of technical and non-technical threats and attacks one can experience when using the internet. In other words, certain data that we transfer may be exposed to significant amount of threats and attacks on internet. These threats and attacks include:-

1. Worm.
  • An independent program that has the ability to self-replicate, which consumes the resources irrespective of the computer program being run or turned off.

2. Trojan Horse.

  • A program that appears to be useful information but it contains hidden functions that presents a security risk and causes damage to your computer.

3. Marco virus.

  • Macro viruses infect files that are created using certain applications or programs that contain macro viruses or worms. These mini-programs run a series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

4. Denial of service attacks. (DOS)

  • DOS attacks are growing to be very sophisticated. It attacks on websites where the attacker uses specialized software to send the data packets to the targeted computer or business with the aim of overloading their resources. Traditional DOS attacks usually attacks from one computer to another. It causes the network to shut down, thus making the websites inaccessible by users.

5. Distributed denial of service (DDOS) attack.

  • DDOS happens when the attacker usually sends a list of IP addresses to the targeted computer. The attacker will then instruct the computers to send data packets against the given IP address by using false source address when all components are ready. The target servers can only survive DDOS attacks if they disconnect from the internet. This usually takes around 4 to 6 hours of recovery time for large corporations.

6. Identity theft and online fraud.

  • Personal identity theft on internet happens when attackers gain and use information retrieved from the victim to make illegal purchases or commit fraud. The most common forms of online frauds are the sale via Internet of counterfeit documents; such as fake IDs and diplomas, and recommendation letters sold as credentials.

7. Data theft.

  • Data theft occurs when there is stealing of information and also exploitation of personal data.

8. Social engineering.

  • An attack using social pressure to trick computer users into compromising computer networks to which those individuals have access into. For instance, a phishing e mail would consist of such phrase: “Please update your personal data by clicking the above link within 48 hours, otherwise your account will be terminated”.

References:

http://www.bsagovernment.com/downloads/MajorOnlineThreats.pdf

1 comments:

full of e commerce knowledge

Post a Comment