Thursday, July 9, 2009

The threat of online security: How safe is our data?

Online security is a kind of defense strategy to ensure that the data in our computer is not being grant access unless through authorization by hackers, furthermore avoid virus attacks. These method of prevention no longer can guarantee that our data is safe.

Threats of online security:
.
1.Worm
Worm is a self-reproducing until it interupts the whole computer system. The examples of worms are Blaster, Sasser, Bagle and Code red which are all causing interruption to the windows systems.


2. Computer virus
Computer virus is actually a kind of computer software that can copy itself to any computer without permission of the user. The examples of computer virus is "I love you".

3. Trojan Horse

The terms trojan horse comes from a Greek Myth. Trojan Horse is a kind of Malware which allows hackers to grant access to computers without any authorization. The examples of threats which can be perform are uploading and downloading files from the computer.


4. Identity theft
Identity theft occurs when there is criminal who uses other person's identity as their own identity. It can also incluse misuse the identity of cresit card and mail fraud.



5. Denial-of-service attack
Denial-of-service attack is an attempt to to make computer resource unavailable for its user. It usually slows down network performance, unavailability of certain websites or inability to access to some websites.



Methods use to prevent threat to the online security to make sure that our data is safe.
.
1. Firewall
Firewall is a system which limits network access between two or more networks. However firewall cannot prevent virus from spreading to the computer systems.





2. Virus defense
Anti virus softwares are use to detect and terminate virus before it spread to our computer system. Unfortunately, anti virus sofware cannot prevent every type of virus as we know virus nowadays are keep on transforming and there are difficulties for the software engineer to create new virus defense. Therefore, data may also be destroyed.




1 comment: