Computer Security


Pythonpedia
Computer Security
Threats of Computer Security:-
A threat is a potential violation of security. When a threat is actually executed it becomes attack. And those who do such action or make them to be happen are called attackers.
Some common computer threats that users faces every day are:
  • Viruses
  • Adware
  • Spyware
  • Spamming
  • PC Intrusion
  • Phishing and Pharming
The Computer Viruses:-
The viruses are malicious codes or program that cause damage to Data and files on a computer system. These viruses can attack on any part of system software such as operating system, files, boot block, systems areas and application macros etc.
Two similar programs also cause virus like effects are:
  • Worms – A worms are a self-replicating program which eats up the entire disk space or memory. It creates copies of files until the disk space is fully filled.
  • Trojan Horses – A Trojan Horses are a program that appears harmless but actually it’s very harmful. The harm it causes is deleting the files or damaging them.
Damage caused by Viruses to the System:-
Viruses can harm the system if it is not checked:
  • Damage or Delete files – Some viruses may delete or damage random documents or specific files that are crucial to your operating system.
  • Slow down your computer – Viruses can run in the background without being seen or knowing you which makes your computer work extremely slow.
  • Invade your email program – Some forms of viruses may wreak even more havoc by spreading themselves to the contacts in your address book.
Spyware:-
It is software which is installed on your computer to spy on your activities and report this data to people willing to pay for it. It tracks user behavior and reports information back to the central source. It may be legal or illegal.
This software mostly gets installed on your computer or system without your consent.
Damage caused by Spyware to the System:-
It can act like peeping tom or a geeky thief for example it can:
  • Compromises your Data, computing habits and identity – It can monitor information such as what websites you visit or record your keystrokes and then send them cyber thief.
  • Alters PC Settings – Some forms of spyware can also alter PC settings like your browser home page setting. It doesn’t do much damage to your system but still it is annoying.
  • Slows down your system – It can rob your system speed and internet access efficiency. When you try to download large files, watch online content etc.
Adware:-
These are the programs that deliver unwanted ads to your system like Pop-Ups. They consume your network bandwidth. It is similar to spyware but it may be installed with your consent. So it is advised that you should read installation agreements thoroughly every time before installing software.  
Damage caused by Adware to the System:-
Some damage caused by Adware’s are:
  • Adware tracks information – It tracks your computing habits to produce targeted advertising on your computer screen.
  • Displays arrays of annoying advertising – When infected with adware you will likely see frequent pop-up ads appear all the time.
  • Slows down your Pc – It is common when any virus attacks your system.
Spamming:-
It refers to the sending of bulk mail by an identified or unidentified source. In non-malicious form bulk advertising mail is sent too many accounts. In malicious form the attackers keeps on sending bulk mail until the mail server runs out of disk space.
Damage caused by Spamming to the System:-
Effects caused by spamming:
  • Spams reduces productivity
  • Spam eats up your time
  • Spam can lead to worse things
PC Intrusion:-
Every system connected to the Internet is potentially targeted by hackers. PC Intrusion can occur in any of the following form:
  • Sweeper Attack – This is another malicious program used by hackers. It deletes all Data from your system.
  • Denial of Services – This type of attack eats up all the resources of a system and the system or application comes to halt.
  • Password Guessing – Mostly hackers crack or guess password of system accounts and gain entry into remote computer systems.  
Eavesdropping:-
Unauthorized monitoring of other people’s communications is called Eavesdropping. Eavesdropping is a passive attack in which an attacker’s gains access to the communication medium through which some communication is taking place and then listens to the communication and gets information about the content of the message.
Eavesdropping can be carried out through all communication devices and media like emails, instant messaging, Internet services etc.
Phishing and Pharming:-
Phishing – It is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, credit card information, account Data etc.
Pharming – It is an attack in which a hacker attempts to redirect website traffic to another, bogus website. Even if the URL is entered correctly it can still be redirected to a fake website.
Cookies:-
The Cookie it is also known as a web cookie or browser cookie. This cookie helps track users browsing sessions and Load information faster but creates some security and privacy concerns as well.
These security and privacy concerns are:
  • Session Data
  • Tracking Information
  • Public Computers
-Thank you

Comments

Popular posts from this blog

Simple C++ Programs on Code Blocks