Trojans:- A Trojan is a network that takes personal information from a home/business co computer and sends it to the internet. Worms:- A worm is a self-replicate computer programme which uses a computer to replicate itself which then spreads to other computers. Hackers:- A hackers is a person who will purposely try to ruin a computer network or someone’s private work. Scams:- A scam is when you use a computer to steal information in order to cause harm to others. Loss of data:- Loss of data is when data on your computer get lost.
P3 – Explain the security risks and protection mechanisms involved in a website In this document I will be explaining in the style of a report the different security risks and protection mechanisms involved in a website, for example hacking, page jacking, phishing etc. I will also be talking about how to prevent from these happening and the different types of software you can download to stop it from happening, for example anti-viruses to stop your computer getting a virus. I will also be talking about the different mechanisms involved in a website for example firewalls, digital certificates, legal considerations etc. I will be explaining how these things stop your computer getting corrupted and misused. SECURITY RISKS Hacking: This is when you break into someone’s computer system and gain access to all their files and personal information and also to delete, corrupt or steal their files.
Ping Sweeps and Port Scans Thesis Statements: In this paper I will talk about the danger that we are facing day by day from hackers and we will talk about two common network probes called Port scan and Ping Sweeps and how to protect ourselves from hem. Introduction: Ping sweeps and ports scans are common methods for hackers to try to break a network. As a system administrator this is a valid concern and for the boss this should not be a worry for him. The system administrator has a lot of steps to stop efforts from hackers to acquire any data by using ping sweeps and ports scans. If hackers are constantly thwarted and discouraged from penetrating your network they normally move on to another site.
They break into computer systems, frequently with intentions to alter or modify existing settings. Sometimes nasty in nature, hacking may cause damage or disruption to computer systems or networks. "Unauthorized access" involves approaching, trespassing , communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent. The goals created by these people are negative and range from accessing and downloading data from corporate servers to defacing a public website. Hactivism is strictly confined to negatively-orientated goals due to the legal and right implications’ that come of controlling private information.
A virus can only spread when it is transmitted by a user over a network or the Internet, or through removable media such as CDs or memory sticks. Viruses are sometimes confused with worms and Trojan horses, or used incorrectly to refer to malware.” With a virus to a pertaining to a personal computer it can delete files and cause damage to your personal computer and causes damage to the hard disk and other aspects of your personal computer. The next threat that people should watch out for is Spam/Spim/Spit. They all are dealing something online pertaining to email, instant messaging or VoIP. This can slow down your network and run the risk of sending faulty email.
P3 explain the security risks and protection mechanisms involved in website performance Security Risks Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it. Viruses: A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Viruses can damage and/or decrease the performance of the machine they “infect”. Phishing: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity from Amazon.
Simple viruses are dangerous; it uses available memory and can bring down an entire system, there are viruses that can bypass security systems and networks. To protect your computer system from this type of malicious code, you can install and use an antivirus program. This utility scans hard disk drives for viruses, worms and Trojan horses and removes, fixes or isolates any threats that are found. Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses on your system as soon as they are discovered. However, there is another kind of software that can be used to protect your computer and personal information, which is spyware this is software that gathers user information without his or her knowledge, for advertising purpose.
Introduction Cybercrime is described as activities involving computers and IT devices through information systems to facilitate unlawful behaviors (McQuade, 2006). All individuals including organizations have the right for self-protection from anyone invading their privacy from these cyber threats. Gary McKinnon, a British citizen is accused with hacking into the U.S. Department of Defense and NASA’s computer systems and has admitted to accomplishing his wrongdoing. He has also been analyzed as being autistic which might have contributed significantly to his crimes. Nonetheless, his extradition to the United States is put on hold as both countries still seek for an agreement on his sentence.
One particular computer crime involves the use of a “Trojan” to acquire information on private computers. A Trojan is a rogue program that corrupts the normal working processes and instructions of valid programs. The rogue program, Trojan”, is infected into the target computer and is used to strip
In today’s society they use a huge number of surveillance cameras and allow National Security Agency to hack into our computers to see what we are doing online. Many websites like Facebook track what we like and dislike to help them suggest pages for us to like. “Inside the flat a fruity voice was reading out a list of figures which had something to do with the production of pig-iron. The voice came from an oblong metal plaque like a dulled mirror which formed part of the surface of the right-hand wall. Winston turned a switch and the voice sank somewhat, though the words were still distinguishable.