Most companies are moving toward doing business via the internet, this is because it is fast, cost-effective and a professional method of concluding business transactions. However the internet is accessible by anyone and online security has been online trader’s main concern in protecting their websites from potential threats, such as malicious attacks by computer viruses, security hacking and information theft.
Malicious attacks are the most frequent form of threat faced by companies and online traders as the common pathway from criminals to users is through the Internet: primarily by e-mail and the World Wide Web. Most computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code.These attacks are usually executed by malicious codes such as worms, Trojan horses, spyware, crimeware, and other malicious and unwanted software.
Worm -.a self-replicating computer program. It uses a network to send copies of itself to spread through a network, rather than just a single computer. Computer infected with worms, would face problems such as computer decelerations and unexpected or frequent system failures.
Prevention methods - Anti-virus and anti-spyware software are helpful, but must be kept up-to-date. The use of a firewall is also recommended.
Trojan horse – unlike computer worms, the trojan horse is to be considered as a virus as it is not a self-replicating computer program spread by email attachments, unsecure software downloads and Websites containing executable content(e.g. A Trojan horse in the form of mp3 file). It requires interaction with a hacker to fulfill their purpose. It is designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform operations such as:-
· Deletion of files
· Data Theft (e.g. passwords, security codes, credit card information)
· Modification of files
· Uploading & Downloading of files
· Installation of software (including other malware)
Prevention method - Antivirus software that is designed to detect and delete Trojan horses preferably preventing them from ever being installed again an activation of firewall to prevent hackers.
Spyware – a software that gathers user information through the user’s Internet connection without the user’s knowledge. Users frequently notice unwanted behavior and degradation of system performance, such as applications freezing, failure to boot, and system-wide crashes. Spyware, which interferes with networking software normally, causes difficulty connecting to the Internet. When a large number of pieces of spyware have infected a Windows computer, the only solution may be to back up user data, and fully reinstalling the operating system which is a costly measure.
Prevention methods - any Antivirus software that have anti-spyware features which provide real time protection against the installation of spyware software on your computer and can be used solely for detection and removal of spyware software that has already been installed onto your computer. The Windows Vista comes with a new program called the Windows Defender that protects the user computer from spyware threats.
Crimeware (phishing information theft) - scams carried out using e-mail or instant messaging and often direct users to enter their private and confidential details in a fake website where it looks identical to the original ones. Identity theft is becoming a common fraud; information can be capture as a result of defenseless in computer security. The information is then used to withdraw bank accounts, steal valuable information and identity duplication to transact in illegal transactions.
Prevention Methods – Always investigate and verify the source of the email or website before provide the required information. Employ software firewall and encryption software to protect identity and data from being access. Control the access and usage privileges to the data regardless of where it travels, inside and outside the enterprise and providing audit trails and reports. Liquid Machines Enterprise Rights Management automatically creates and enforces security policy anywhere, at any time, for any data no matter where it resides, the applications it touches or to where it travels.
Referrences
articleid=39456http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history
http://www.bsagovernment.com/downloads/MajorOnlineThreats.pdf
http://www.tech-faq.com/online-security-threats.shtml
http://www.govexec.com/story_page.cfm?
http://www.guard-privacy-and-online-security.com/
The time now is...
Welcome
Hi, thank you for visiting our blog. We are students of University Tunku Abdul Rahman. This blog is created as a requirement to have our E-Commerce assignment assessed.
Our members
Abraham
Boon Keat
Li Shi
Yan Ho
Boon Keat
Li Shi
Yan Ho
Calendar
Comments
Blog Archive
-
▼
2009
(21)
-
▼
July
(11)
- A discussion on E-learning offered in Malaysian un...
- A review on a post on e-tailing from my E-Commerce...
- The application of prepaid cash card for consumers
- The threat of online security: How safe is our data?
- E-Gorvernment in Malaysia : Its Implementation so ...
- Review a local, transactional e-commerce site -1
- Mobile payment systems in Malaysia: Its potential ...
- Review a local, transactional e-commerce site -2
- Corporate Blogging : A new marketing communication...
- Credit Card Debts : Causes and Prevention
- The application of 3rd party certification program...
-
▼
July
(11)
Labels
- "Abraham" (5)
- "Boon Keat" (6)
- "Li Shi" (5)
- "Yan Ho" (5)
- Introduction (4)
- Week 3 (4)
- Week 4 (4)
- Week 5 (4)
- Week 6 (5)
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment