Cyber Security : Threats to computer security

Cyber Security is important because globally people, businesses, corporates etc. are dependent on computer network for storing, accessing and providing business information. This is the reason that various threats to cyber security are studied and a counter plan is prepared to secure the networks.




A threat is a potential violation of security. When a threat is actually executed, it becomes a attack. Those who execute such actions, or cause them to be executed are called attackers. 
Some common threats that the average computer user faces are -






1. Computer viruses

Computer viruses are malicious codes/programs that cause damage to data and files on a system. Viruses can attack any part part of a computer's software such as boot block, operating system, system areas, files and application-program-macros. Two other similar programs also cause virus like effects. These are -

A) Worms :

A worm is a self-replicating program which eats up the entire disk space or memory. A worm keeps on creating its copies until all the disk space or memory is filled.

B) Trojan Horses : 

A trojan horse is a program that appears harmless (such as text editor or a utility program) but actually performs malicious functions such as deleting or damaging files.

Damage caused by viruses - Viruses can do the following if left unchecked :
  • Damage or delete files.
  • Slow down your computer.
  • Invade your e-mail program.


2. Spyware :

Spyware is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it. It tracks the user's behaviour and reports information back to a central source. These are used to spy on some one either for legal or illegal purpose.
Damage caused by spyware : Spyware can act like a peeping tom or, at worse, a geek thief. For example, it :
  • Compromises your data, computing habits, and identity.
  • Alter PC settings.
  • Slows down your PC.

3. Adware :

These are the programs that deliver unwanted ads to your computer (generally in pop-ups form). They consume your network bandwidth. Adware is similar to spyware - however, it may be installed with your consent. So it is advised that you thoroughly read installation agreements before you allow installation of a software.
Damaged caused by Adware : Adware comes complete with following disadvantages :
  • Adware tracks information just like spyware.
  • Displays arrays of annoying advertising.
  • Slow down your PC.






4. Spamming :

Spamming refers to the sending of bulk-mail by an identified or unidentified source. In non-malicious form, bulk-advertising mail is sent to many accounts. In malicious forms (e.g., e-mail bombing), the attacker keeps on sending bulk mail until the mail-server runs out disk space. 
Damage caused by Spam :
  • Spam reduces productivity.
  • Spam eats up your time.
  • Spam can lead to worse things.
Also Read :

5. PC Intrusions :

Every PC (personal computer) connected to the internet is a potential target for hackers. Computers are under constant attack from cyber vandals. PC Intrusions can occur in any  of the following form - 

A) Sweeper Attack :

This is another malicious program used by hackers. It sweeps i.e., deletes all the data from the system.

B) Denial of Services :

This type of attack eats up all the resources of a system and the system or applications come to a halt. Example of such an attack is flooding a system with junk mail.

C) Password Guessing :

Most Hackers crack or guess passwords of system accounts and gain entry into remote computer systems. And then they use it for causing damages in one or another form. 

D) Snooping :

Snooping refers to opening and looking through files in unauthorized  manner. Snooping may involve many type of things such as gaining access of data in unauthorized way, casually observing someone else's e-mail or monitoring activity of someone else's computer through a sophisticated snooping software. It may involve - monitoring of keystrokes pressed, capturing a passwords and login information and interception of e-mail and other private communicate and data transmission. 

E) Eavesdropping :

Eavesdropping is also similar to snooping. When some one listens to a conversation that they are not part of, it is eavesdropping. Formally, you can say that intentional interception of someone else's data (such as e-mail, login ID, password, credit card info etc.) as it passes through a user's computer to server or vice-versa is called eavesdropping. 





6. Phishing :

It is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, credit card information, account data etc. In phishing, an imposter uses an authentic looking e-mail or website to trick recipients into giving out sensitive personal information. For instance, you may receive an e-mail from your bank (which appears genuine to you) asking to update your information online by clicking at a specified link. Though it appears genuine, you may be taken to  a fraudulent site where all your sensitive information is obtained and later used for cyber-crimes and frauds.

Comment for Question and Queries. 



Cyber Security : Threats to computer security Cyber Security : Threats to computer security Reviewed by PMT on November 05, 2018 Rating: 5

4 comments:

  1. Thank you dear, I found your information really useful. I would like to say thanks once again for this information. Keep posting all the new information.
    Cyber Security
    Cyber Security Pakistan
    Cyber Security Tips

    ReplyDelete
  2. There are a lot of blogs over the Internet. But I can surely say that your blog is amazing in all. It has all the qualities that a perfect blog should have. Cyber Security Toronto

    ReplyDelete
  3. IT Security is vital! The World's largest vendor Neutral cyber security education provider EC Council focus highly on the threats of breaches on cyber security to organizations. cyber security training in hyderabad

    ReplyDelete
  4. Computer based CCNA courses are very much a luxury to have on hand because they allow you to schedule in study time at your discretion. CCNA Training in Pune

    ReplyDelete

Powered by Blogger.