Online security is a kind of defense strategy to ensure that the data in our computer is not being grant access unless through authorization by hackers, furthermore avoid virus attacks. These method of prevention no longer can guarantee that our data is safe.
Threats of online security:
.
1.Worm
Worm is a self-reproducing until it interupts the whole computer system. The examples of worms are Blaster, Sasser, Bagle and Code red which are all causing interruption to the windows systems.
Computer virus is actually a kind of computer software that can copy itself to any computer without permission of the user. The examples of computer virus is "I love you".
3. Trojan Horse
The terms trojan horse comes from a Greek Myth. Trojan Horse is a kind of Malware which allows hackers to grant access to computers without any authorization. The examples of threats which can be perform are uploading and downloading files from the computer.
3. Trojan Horse
The terms trojan horse comes from a Greek Myth. Trojan Horse is a kind of Malware which allows hackers to grant access to computers without any authorization. The examples of threats which can be perform are uploading and downloading files from the computer.
Identity theft occurs when there is criminal who uses other person's identity as their own identity. It can also incluse misuse the identity of cresit card and mail fraud.
Denial-of-service attack is an attempt to to make computer resource unavailable for its user. It usually slows down network performance, unavailability of certain websites or inability to access to some websites.
.
1. Firewall
Firewall is a system which limits network access between two or more networks. However firewall cannot prevent virus from spreading to the computer systems.
Anti virus softwares are use to detect and terminate virus before it spread to our computer system. Unfortunately, anti virus sofware cannot prevent every type of virus as we know virus nowadays are keep on transforming and there are difficulties for the software engineer to create new virus defense. Therefore, data may also be destroyed.
Looking for security - Try Cyberoam UTM.
ReplyDelete