Sunday, February 7, 2016

WHAT YOU SHOULD KNOW ABOUT COMMONLY USED COMPUTER ATTACKS


Very frequently, computer and network security is not really considered about until a real problem occurs. By this time it might be too late because the violation in security can cause massive and possibly damaging complications to your computers. The data present in our computers can be exploited by unauthorized invasions. Prevention of data theft like passwords, bank account numbers or credit card information is vital to our day-to-day life as many of our activities depend on the security of the data paths. Such data theft can lead to identity theft. The most widely used attacks against a computer system are malware, adware, phishing and many more.


Malware
Malware is a shortened term for malicious software. Malicious software is precisely designed to damage a computer or gain access without the owner actually knowing it. There are numerous kinds of malware; worms, keyloggers, spyware, or any kind of malicious code that penetrates a computer. Normally, the software is reflected as malware based on the intent of the maker rather than its real characteristics. There are numerous reasons that can make computers more exposed to malware attacks. It could be because of the flaws in the operating system design, running all of the computers on a network through the same operating system (OS), giving unauthorized user permissions to the system or network. It could also be because of using the Windows operating system as it has gained more popularity throughout the years and it gets the most malware written for it. The greatest defense from malware is to be cautious about what email attachments one opens, be careful when using the Internet, do not open unknown or suspicious websites, and make sure to install and maintain software updates in your computer as they have new updates to block malware to fix bugs and make sure to buy a quality antivirus program.


Adware
Adware is a shortened term for Advertising Supported Software. Adware is used when referencing any kind of program that downloads or shows unsolicited banner commercials in the software being used. Adware is frequently shoved within software a computer owner buys. The creators of these applications incorporate added code that delivers the advertisements, that is viewed through pop-up windows or through a bar that emerges on a computer screen. The explanation for the adware is that it supports in recovering development expense and it also supports to hold down the cost for the user. The adware has been critiqued highly because it typically includes code that tracks the user's private information and passes it on to third parties, without the user's permission or awareness. There is antivirus software that is available in the market, which can detect and remove spyware. Some of those antivirus software’s are Kaspersky, ESET, AVG and McAfee.
Phishing
When impostors through the Internet impersonate as a business to trick you into giving out your private information, it is called phishing. In order to capture the user’s login and password credentials, the imposters incorporate a URL in a spam e- mail that links to a bogus Web site controlled by the imposter, but that imitates the login page of some gaming, banking or similar site. This is typically incorporated in some message telling that critical action is needed by the user to validate their account, to avoid it from being locked. If the users are insensitive and do not comprehend that they are being tricked, then following the link and providing the requested specifics could surely result in the imposters abusing the users account using the captured credentials. Deleting emails and text messages that request you to verify or provide private information like social security number, bank account numbers, credit card and passwords would be the wise step to take as legitimate companies do not request for this kind of sensitive information through text or email.

References

Case, D. W. (2013). Business Data Communications: Infrastructure, Networking and Security (7th Edition ed.). Upper Saddle River, NJ: Pearson Education, Inc.
DII Consulting. (2015, n.d n.d). Photo Credit: Computer Repair: DIY Malware Removal. Retrieved February 04, 2016, from DII Consulting – Computer Repair & Web Design: http://www.diiconsulting.com/computer-repair-diy-malware-removal/
Robinson, B. (2015, n.d n.d). Photo Credit: Decoding Malware at Sonoma State. Retrieved February 04, 2016, from KRCB North Bay Public Media: http://radio.krcb.org/post/decoding-malware-sonoma-state
Rouse, M. (2015, n.d n.d). Adware. Retrieved February 05, 2016, from Search Security TechTarget: http://searchsecurity.techtarget.com/definition/adware

Symantec. (2010, n.d n.d). What is malware and how can we prevent it? Retrieved February 05, 2016, from PC Tools by Symantec: http://www.pctools.com/security-news/what-is-malware/

No comments:

Post a Comment