(e) Password attacks Password based attacks or password crackers are aimed at guessing the password for a system until the correct password is determined. One of the primary security weaknesses associated with password based access control is that all security is based on the user ID and password being utilized. But who is the individual using the credentials at the keyboard? The password information is simply sent in clear or plain text – no form of encryption is utilized. Remember that network attackers can obtain user ID and password information and can then pose as authorized users and attack the corporate network.
When it comes to organizations and their employees, the FBI offer some preventive measures when dealing with attacks to the organization. A company should make sure that employees are aware different types of hacking, and their critical roles in protecting the organization’s data. Antivirus, anti-malware and operating systems should be set to automatically update and conduct regular scans. The backup of data needs to be made regularly, verified, and secure, but should not be connected to the computers and networks that are being used to backing up. When it comes to personal protection on our personal devices, there are many preventive measure that need to be followed.
How it Affect / Attack. a. Emails may contain links to Websites that are infected with Malware. b. It is typically carried out by Email sporting or instant messaging. c. It directs users to fake Website, whose looks and feelings are almost identical to the legitimate one.
• Worms – A computer worm is a malware computer program that reproduces in order to spread to other computers. He often uses a computer network to spread, based on security vulnerabilities on the target computer to access it. Unlike a computer virus, it does not need to join an existing program. • Trojan horse – At the beginning appears to benign, but then does something other than expected. • Bad applets – malicious java applets or ActiveX controls that may be downloaded onto clients and activated merely by surfing to a web site.
These systems deal with detecting intrusions in network data. Outside attackers or spammers are responsible for such attacks who aim to gain unauthorised access to network information to either disable network or steal confidential information. A major
The only difference is that the hardware firewall acts as a DHCP server to the network whereas many OS have built-in software firewalls to protect user against virus, malware etc. Importance of Firewall : if someone using a computer or having a small network one must track threat by hackers who can hack their computer data /network very easily there are plenty others ways they get infected some of them are: -PC can get infected from VIRUS, WORM, Malware etc. -Theft or disclosure of Personal data -Interception of data These are some causes of not having a firewall protection in PC HOW FIREWALL PROTECT PC:-
Many forms of spyware, however, are more malicious and can have serious effects on users and businesses. Key logging spyware, for example, transmits to the author of the spyware a log of every keystroke entered on that computer. The author can then sift through this data to find valuable information, such as credit card numbers, security codes and confidential information, from that user or their business. Other types of spyware search through the data stored on the host computer for particular types of file, which are likely to contain confidential or personal information, such as Word documents or images, and transmit them to the spyware
The cyber crime history started in 1990s and it basically get information’s about the systems, and it was between two people against each other by hacking the most secure web sit. As a hacker get more skill fully started using their knowledge and expertise to gain more famous and money. Now days, cyber crime in modern society use their knowledge in cyber crime to explode or steel money from people without doing any work. Cyber crimes are broadly categorized into three categories; namely crime against. Individual, property and government .
They attack a computer with the sole intent of causing harm. They can make the computer malfunction or even this can be very costly especially if you lose important data. Worse yet is the fact that you can easily fall victim to malicious software by clicking on a link on the Internet that appears genuine. Internet viruses can be categorized to three types - those that harm your executable boot files and system, those that affect a specific file by destroying it and those that keep changing things in your computer like Word files. You can protect yourself by installing a reliable anti-virus program on your computer before accessing the
The obsolescence also can occur with the storing of the media. It can make the media or format cannot be recover and difficult to read. Other than that, hacking and sabotage is also the reason of the loss of the digital information. In the generation nowadays, people have ability and skills to hacking and sabotage the information in the digital form. They know how to corrupt the file, copying the files, and hacking the digital form information through computer by computers.