They are viruses, Spyware, Trojan and worms. Virus is a self infection by copying other normal file malware, infected files can be utilized to remove the virus after return to normal, there are some infected files cannot be cleared. At this time recommended to delete the file, reinstall the application. According to the author Kirby explains spyware - just like a spy, a hacker uses spyware to track internet activities and steal people’s information and also install backdoors in user computers without people being conscious of it (Kirby, 2015). The user's private data and important information will be the backdoor acquisition; even these "backdoor" can allow hackers to remotely manipulate the user's computer.
So before you buy things on the internet you have to make sure that the page you would buy something is serious. Cybercrime is so dangerous because more and more people make their finances online and have saved the passwords on the PC. So hacker have the full control and can steal the money. But could also become a offender as fast as you could become a victim. When you download music form Internet platforms or stream online series it is a cybercrime but not so bad like hacking the government or something like this.
Nowadays, the statistics show that there is an increment in the number of cybercrime especially in this new era technology. Recently, this rises up hot issue about security threat in e-commerce. Cyber-attack usually happened on online business and organizations which threaten the security of data and operations in their trademark reputation as well as their intellectual property. These actions can cause significant damage or loss in e-commerce. Security is like a strong protective wall which blocks the bad guys and launching small, well-guarded doors to provide secure.
Many forms of spyware, however, are more malicious and can have serious effects on users and businesses. Key logging spyware, for example, transmits to the author of the spyware a log of every keystroke entered on that computer. The author can then sift through this data to find valuable information, such as credit card numbers, security codes and confidential information, from that user or their business. Other types of spyware search through the data stored on the host computer for particular types of file, which are likely to contain confidential or personal information, such as Word documents or images, and transmit them to the spyware
How Scareware Affect / Attack a. Some forms of Spyware also qualify as Scareware because they change the desktop background and claims that same type of spyware has infected the computer. b. Smart fortress is also a type of Scareware when they ask the users to buy professional security for their computer as it has lot of viruses. 6.
An example of cyber stalking would be to put a recording or monitoring device on a victim's computer or smartphone in order to save every keystroke they make so that the stalker can obtain information. Another example would be repeatedly posting derogatory or personal information about a victim on web pages or social media despite being warned not to do so. Cyber stalking has the potential punishment of a prison sentence. Identity
A virus may corrupt or delete data from your computer, it can come from email programs which spread to other computers, it can even erase everything from your hard disk. Computer viruses are often spread by email attachments, email messages and instant messaging. It’s important that you never open an email attachment unless you know who it’s from and are expecting it. Firewalls Firewall is a security software which aims to protect a computer from computer viruses. Firewall monitors traffic coming in the operating system and then helps to stop harmful programs to attempt access to the computers users personal information or hinders the computer users use from that computer.
People create thousands of viruses on the Internet today. So, there are many reasons why they create them: • Stealing information Online games and virtual goods have real life value attached to them and virus is created to steal online account information related with online games. Using this type of virus, a person could gain access to a victim's account and then steal their information and currency. They could even sell their information to other players for real money. • Making money Computer viruses perhaps slow down the computer work without damaging the computer all that much, other than slows it down.
The cyber crime history started in 1990s and it basically get information’s about the systems, and it was between two people against each other by hacking the most secure web sit. As a hacker get more skill fully started using their knowledge and expertise to gain more famous and money. Now days, cyber crime in modern society use their knowledge in cyber crime to explode or steel money from people without doing any work. Cyber crimes are broadly categorized into three categories; namely crime against. Individual, property and government .
INTRODUCTION TO NETWORK SECURITY ABSTRACT Network security is protection of the files and directories in a computer network against hacking, misuse and unauthorized changes to the system. Network security involves the authorization of access to data in a network which is controlled by the network administrator. Users are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Today almost anyone can become a hacker by downloading tools from the internet. Nowadays security is becoming vital in case of networking because everyday a new kind of attack is generated which leads to compromise our network and have security in network is decreasing because