Computer Security
Pythonpedia |
Computer
Security
Threats
of Computer Security:-
A threat is a potential violation of
security. When a threat is actually executed it becomes attack. And those who
do such action or make them to be happen are called attackers.
Some common computer threats that users
faces every day are:
- Viruses
- Adware
- Spyware
- Spamming
- PC Intrusion
- Phishing and Pharming
The
Computer Viruses:-
The viruses are malicious codes or
program that cause damage to Data and files on a computer system. These viruses
can attack on any part of system software such as operating system, files, boot
block, systems areas and application macros etc.
Two similar programs also cause virus
like effects are:
- Worms – A worms are a self-replicating program which eats up the entire disk space or memory. It creates copies of files until the disk space is fully filled.
- Trojan Horses – A Trojan Horses are a program that appears harmless but actually it’s very harmful. The harm it causes is deleting the files or damaging them.
Damage
caused by Viruses to the System:-
Viruses can harm the system if it is not
checked:
- Damage or Delete files – Some viruses may delete or damage random documents or specific files that are crucial to your operating system.
- Slow down your computer – Viruses can run in the background without being seen or knowing you which makes your computer work extremely slow.
- Invade your email program – Some forms of viruses may wreak even more havoc by spreading themselves to the contacts in your address book.
Spyware:-
It is software which is installed on
your computer to spy on your activities and report this data to people willing
to pay for it. It tracks user behavior and reports information back to the
central source. It may be legal or illegal.
This software mostly gets installed on
your computer or system without your consent.
Damage
caused by Spyware to the System:-
It can act like peeping tom or a geeky
thief for example it can:
- Compromises your Data, computing habits and identity – It can monitor information such as what websites you visit or record your keystrokes and then send them cyber thief.
- Alters PC Settings – Some forms of spyware can also alter PC settings like your browser home page setting. It doesn’t do much damage to your system but still it is annoying.
- Slows down your system – It can rob your system speed and internet access efficiency. When you try to download large files, watch online content etc.
Adware:-
These are the programs that deliver
unwanted ads to your system like Pop-Ups. They consume your network bandwidth.
It is similar to spyware but it may be installed with your consent. So it is
advised that you should read installation agreements thoroughly every time before
installing software.
Damage
caused by Adware to the System:-
Some damage caused by Adware’s are:
- Adware tracks information – It tracks your computing habits to produce targeted advertising on your computer screen.
- Displays arrays of annoying advertising – When infected with adware you will likely see frequent pop-up ads appear all the time.
- Slows down your Pc – It is common when any virus attacks your system.
Spamming:-
It refers to the sending of bulk mail by
an identified or unidentified source. In non-malicious form bulk advertising
mail is sent too many accounts. In malicious form the attackers keeps on
sending bulk mail until the mail server runs out of disk space.
Damage
caused by Spamming to the System:-
Effects caused by spamming:
- Spams reduces productivity
- Spam eats up your time
- Spam can lead to worse things
PC
Intrusion:-
Every system connected to the Internet
is potentially targeted by hackers. PC Intrusion can occur in any of the
following form:
- Sweeper Attack – This is another malicious program used by hackers. It deletes all Data from your system.
- Denial of Services – This type of attack eats up all the resources of a system and the system or application comes to halt.
- Password Guessing – Mostly hackers crack or guess password of system accounts and gain entry into remote computer systems.
Eavesdropping:-
Unauthorized monitoring of other people’s
communications is called Eavesdropping. Eavesdropping is a passive attack in
which an attacker’s gains access to the communication medium through which some
communication is taking place and then listens to the communication and gets
information about the content of the message.
Eavesdropping can be carried out through
all communication devices and media like emails, instant messaging, Internet
services etc.
Phishing
and Pharming:-
Phishing –
It is the criminally fraudulent process of attempting to acquire sensitive
information such as usernames, passwords, credit card information, account Data
etc.
Pharming – It is an attack in which a
hacker attempts to redirect website traffic to another, bogus website. Even if
the URL is entered correctly it can still be redirected to a fake website.
Cookies:-
The Cookie it is also known as a web
cookie or browser cookie. This cookie helps track users browsing sessions and Load
information faster but creates some security and privacy concerns as well.
These security and privacy concerns are:
- Session Data
- Tracking Information
- Public Computers
-Thank
you
Comments
Post a Comment