Saturday, December 15, 2018
'Organisational System Security Internet Security Issues Essay\r'
'Adwargon ââ¬\r\nIs a   computing device softw ar which you get when you  take a crap downloaded a different program or software for free or at a  cut price. Its main  drive is to download adverts to your  estimator  assort when you visit websites. Adware is seen by a developer as  away(predicate) to rec everywhere  comprises of making software. But to the  command   take to the woodsr adverts on  at that place  supervise are annoying be ride it puts them off of what thither doing and they  begin to   achieve full every advert down manually.\r\nBlackhat ââ¬\r\nIs a  pertain  give to a hacker whose purpose is to  approach  info with  reveal permission and to  molest it or change it. Blackhat hackers can do this for arrange of reasons to make profit or as a hobby. They  may  in like manner send other substance abusers  viruses,  cyberspace worms or  e-mail them. This type of hacker is known as the bad guy in the  reckoner  valet de chambre.\r\nBotnet ââ¬\r\nIs a software robot, w   hen a spammer sends out viruses to general users a Bot is attached to it. Once the spammer has control of the infected  calculating machines   on that pointfore they will have to  corrupt a Botnet which  whence lets them operate the control take  calculating machines,  wherefore the spammer will send out a message to the  computing devices cause them to send spam to mail servers, resulting in users opening up thither mail will have tons of junk.\r\nself-abnegation of service ââ¬\r\nIs an  besiege which leaves users with out use of the service of a website which they would normally use. The DoS attack does  non normally mean the controller of it has stolen information, but has cost the company which it has  purported money and time. This can cause users that use that companyââ¬â¢s website to purchase what they want from  other website meaning that companyââ¬â¢s business rivals are making money from the DoS attack on them.\r\nExploit ââ¬\r\nIs a software which contains comma   nds that take  value of a  computing device  formation with weak  certificate, the purpose of an exploit is to give a user to a gr takeer extent privileges on a  calculator system allowing them to  glide path more data which was previously restricted from them. A weakness in the exploit is that it stops  runnel when a newer version of the software is  planted.\r\nKeylogger ââ¬\r\nIs a  guile which you can get as software or hardware it is  plug ined or installed inside your keyboard. Its function is to log in keystrokes. There are  galore(postnominal) different reasons why we may use this such(prenominal) as helping fix computer system errors or seeing how an employee users  in that respect keyboard to see if  at that place good at there job. You can purchase Keyloggerââ¬â¢s off the internet.\r\nMalware ââ¬\r\nIs a software, its task is to damage a computer system such as to give a computer system a virus. Malware gets its  divulge from the beginning of the word malicious and    the  outcome of the word software. Malwareââ¬â¢s include arrange of  pestilential programs such as computer viruses, worms,  Trojans, rootkits and sometimes adware.\r\n portion sniffing ââ¬\r\nIs a software or hardware which is  utilise to analyze traffic that is passing through  over a  engagement. The packet sniffer checks each packet then decodes them so that they can be analyzed, to check there content. The analyzing is useful for finding out network problems, monitor network usage from users and debug client and network protocols. This will help maintain a network.\r\nPhishing ââ¬\r\nIs a term given that is a breech of security by a hacker. Such as attempting to  dramatise sensitive information on other computer users like there usernames, passwords and credit card information. The hackers target popular websites such as eBay, MySpace and PayPal. They get  give of userââ¬â¢s personnel information by sending fake emails pretending to by your bank.\r\nPiggybacking Ã¢â   ¬\r\nIs a computer word which refers to a user connecting there laptop or computer to another persons internet connection. Then using the internet without the permission of the  possessor of the internet connection. But if you own a café and have a hotspot this is not considered piggybacking because you have given permission to people to use your hotspot to connect to the internet.\r\nSpyware ââ¬\r\nIs a computer software that is secretly installed on to your computer and can take control over somethingââ¬â¢s that you do on it. It can install software which you did not want on your computer also it can make you go on websites that you did not click to go on and it could led you to  deadly viruses that could affect your computer. When turning off your computer spyware can even change your computer settings.\r\nTrojan ââ¬\r\nA Trojan is a computer virus that appears on your computer  intentional to cause your computer harm. It has been know to be similar to a worm.  just abo   ut Trojans may not cause harm to your computer but the six main types of Trojans are ones that cause remote access, data destruction, download, get on to a server, anti â⬠viruses software disabler and denial of service attack.\r\nWhitehat ââ¬\r\nIs the name given to a hacker, whoââ¬â¢s purpose is to  check a breech of security within a company or organization. They are normally  assiduous by a company to protect against there counterparts blackhat hackers who want to hack and steal information and data that does not belong to them. In the computing world the Whitehat hacker is know as the good guy.\r\n plant louse ââ¬\r\nIs a computer program which sends copies of its self to networks, designed to cause harm to the network that they have targeted. It likes to eat up the bandwidth  utilize on the network. Worms can also cause serious harm and damage to a computer operating system by  struggle the weak parts of the computer.\r\nZero-day Attack ââ¬\r\nIs a  nemesis to comp   uters, by trying to take control of computer applications that are unknown or patchfree. The attacker that controls the zero-day attack normally sets it up on a  globe forum because of the number of users that it could affect.\r\n golem ââ¬\r\nIs a computer that has been attached to the internet by a computer hacker. The owners of zombie computers do not know that there computers have be compromised. They are normally used as part of a botnet, but  plot of ground they have been put in zombie  way the hacker can use other userââ¬â¢s computers to send Trojans or other harmful viruses.\r\nResources\r\nAdware\r\nhttp://en.wikipedia.org/wiki/Adware\r\nBlackhat\r\nhttp://en.wikipedia.org/wiki/Black_hat\r\nBotnet\r\nhttp://en.wikipedia.org/wiki/Botnet\r\nhttp://www.ibiblio.org/botnet/flora/indexstart.html\r\nDenial of service\r\nhttp://searchsoftwarequality.techtarget.com/sDefinition/0,,sid92_gci213591,00.html\r\nExploit\r\nhttp://en.wikipedia.org/wiki/Exploit_(computer_security)\r\nK   eylogger\r\nhttp://en.wikipedia.org/wiki/Keystroke_logging\r\nhttp://www.actualspy.com/\r\nMalware\r\nhttp://en.wikipedia.org/wiki/Malware\r\nhttp://www.microsoft.com/technet/security/alerts/info/malware.mspx\r\nPacket sniffing\r\nhttp://en.wikipedia.org/wiki/Packet_sniffer\r\nhttp://netsecurity.about.com/cs/hackertools/a/aa121403.htm\r\nPhishing\r\nhttp://www.antiphishing.org/\r\nhttp://www.webopedia.com/ name/p/phishing.html\r\nPiggybacking\r\nhttp://www.thefreedictionary.com/piggybacking\r\nSpyware\r\nhttp://en.wikipedia.org/wiki/Spyware\r\nTrojan\r\nhttp://en.wikipedia.org/wiki/Trojan_horse_(computing)\r\nWhitehat\r\nhttp://en.wikipedia.org/wiki/White_hat\r\nWorm\r\nhttp://en.wikipedia.org/wiki/Computer_worm#Protecting_against_dangerous_computer_worms\r\nZero-day Attack\r\nhttp://en.wikipedia.org/wiki/Zero-Day_Attack\r\nhttp://www.wisegeek.com/what-is-a-zero-day-attack.htm\r\nZombie\r\nhttp://en.wikipedia.org/wiki/Zombie_computer\r\n'  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment