Wednesday, February 20, 2019
Organisational System Security Internet Security Issues Essay
Adw be Is a softw are which you decease when you thrust downloaded a dissimilar program or software for free or at a reduced price. Its main purpose is to download adverts to your calculating machine screen when you visit websites. Adware is seen by a developer as away to think costs of making software. But to the general subprogramr adverts on on that point monitor are annoying be induce it puts them forward of what at that place doing and they have to resolve every advert down manually.Blackhat Is a give given to a hacker whose purpose is to access data with out licence and to persecute it or change it. Blackhat hackers stand do this for arrange of reasons to make winnings or as a hobby. They may also send an early(a)(a)(prenominal) users viruses, internet worms or spam them. This type of hacker is known as the bad guy in the electronic computing machine world.Botnet Is a software robot, when a spammer sends out viruses to general users a Bot is attached to it. O nce the spammer has control of the infect reckoners then they will have to obtain a Botnet which then lets them run the controlled computers, then the spammer will send out a message to the computers cause them to send spam to mail servers, resulting in users opening up thither mail will have tons of junk.Denial of service Is an approaching which leaves users with out use of the services of a website which they would commonly use. The DoS aggress does non normally mean the controller of it has stolen selective informationrmation, scarce has cost the order which it has tar discovered money and time. This fundament cause users that use that companys website to purchase what they trust from another website meaning that companys business rivals are making money from the DoS attack on them.Exploit Is a software which contains commands that take advantage of a computer system with swooning security, the purpose of an exploit is to give a user more privileges on a computer sy stem allowing them to access more data which was antecedently restricted from them. A weakness in the exploit is that it stops ravel when a newer version of the software is installed.Keylogger Is a device which you can get as software or hardware it is connected or installed wrong your keyboard. Its function is to log in keystrokes. There are many different reasons why we may use this such(prenominal) as helping convey computer system errors or seeing how an employee users there keyboard to see if there good at there job. You can purchase Keyloggers off the internet.Malware Is a software, its task is to damage a computer system such as to give a computer system a virus. Malware gets its chance on from the beginning of the word malicious and the ending of the word software. Malwares embroil arrange of vilifyful programs such as computer viruses, worms, trojans, rootkits and sometimes adware. sheaf sniffing Is a software or hardware which is used to analyze business that is pa ssing through over a network. The big bucks sniffer checks each packet then decodes them so that they can be analyzed, to check there content. The analyzing is reusable for finding out network problems, monitor network usage from users and correct client and network protocols. This will help maintain a network.Phishing Is a term given that is a rear of tube of security by a hacker. Such as attempting to acquire sensitive information on other computer users like there usernames, passwords and credit card information. The hackers target usual websites such as eBay, MySpace and PayPal. They get hold of users force-out information by sending fake emails pretending to by your bank.Piggybacking Is a computer word which refers to a user connecting there laptop or computer to another persons internet connection. Then using the internet without the permission of the owner of the internet connection. But if you own a caf and have a hotspot this is not considered piggybacking because you have given permission to people to use your hotspot to connect to the internet.Spyware Is a computer software that is secretly installed on to your computer and can take control over somethings that you do on it. It can install software which you did not want on your computer also it can make you go on websites that you did not click to go on and it could led you to harmful viruses that could affect your computer. When crook off your computer spyware can even change your computer settings.Trojan A Trojan is a computer virus that appears on your computer designed to cause your computer harm. It has been know to be similar to a worm. Some Trojans may not cause harm to your computer but the six main types of Trojans are ones that cause remote access, data destruction, download, get on to a server, anti viruses software disabler and denial of service attack.Whitehat Is the name given to a hacker, whos purpose is to prevent a breech of security within a company or organization. They a re normally employed by a company to protect against there counterparts blackhat hackers who want to hack and steal information and data that does not belong to them. In the computing world the Whitehat hacker is know as the good guy. sprain Is a computer program which sends copies of its self to networks, designed to cause harm to the network that they have targeted. It likes to eat up the bandwidth used on the network. bird louses can also cause serious harm and damage to a computer operating system by attacking the weak parts of the computer.Zero-day clap Is a threat to computers, by trying to take control of computer applications that are unknown or patchfree. The attacker that controls the zero-day attack normally sets it up on a public forum because of the number of users that it could affect.Zombie Is a computer that has been attached to the internet by a computer hacker. The owners of automaton computers do not know that there computers have be compromised. They are norma lly used as part of a botnet, but enchantment they have been put in zombie mode the hacker can use other users computers to send Trojans or other harmful viruses.ResourcesAdwarehttp//en.wikipedia.org/wiki/AdwareBlackhathttp//en.wikipedia.org/wiki/Black_hatBotnethttp//en.wikipedia.org/wiki/Botnethttp//www.ibiblio.org/botnet/flora/indexstart.htmlDenial of servicehttp//searchsoftwarequality.techtarget.com/sDefinition/0,,sid92_gci213591,00.htmlExploithttp//en.wikipedia.org/wiki/Exploit_(computer_security)Keyloggerhttp//en.wikipedia.org/wiki/Keystroke_logginghttp//www.actualspy.com/Malwarehttp//en.wikipedia.org/wiki/Malwarehttp//www.microsoft.com/technet/security/alerts/info/malware.mspxPacket sniffinghttp//en.wikipedia.org/wiki/Packet_snifferhttp//netsecurity.about.com/cs/hackertools/a/aa121403.htmPhishinghttp//www.antiphishing.org/http//www.webopedia.com/TERM/p/phishing.htmlPiggybackinghttp//www.thefreedictionary.com/piggybackingSpywarehttp//en.wikipedia.org/wiki/SpywareTrojanhttp//en .wikipedia.org/wiki/Trojan_horse_(computing)Whitehathttp//en.wikipedia.org/wiki/White_hatWormhttp//en.wikipedia.org/wiki/Computer_wormProtecting_against_dangerous_computer_wormsZero-day Attackhttp//en.wikipedia.org/wiki/Zero-Day_Attackhttp//www.wisegeek.com/what-is-a-zero-day-attack.htmZombiehttp//en.wikipedia.org/wiki/Zombie_computer
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment