Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / NewStats: 3,209,076 members, 8,004,800 topics. Date: Sunday, 17 November 2024 at 07:29 AM |
Nairaland Forum / Science/Technology / Computers / Computer Threats You Should Be Aware Of (930 Views)
Be Aware of The Scam Sites That Pay By Watching Advertisement / Potential Security Threats To Your Computer Systems / 3 Types Of Malware You Should Be Aware (2) (3) (4)
(1) (Reply)
Computer Threats You Should Be Aware Of by dimexy247(m): 12:41am On Aug 07, 2017 |
With the wide scale utilization of the web, there are diverse sorts of PC threats, that the PC systems are susceptible to. Each of this threats can cause potential harm and cause a considerable measure of mischief if the information is lost. It is vital to know the diverse sorts of dangers so the information can be protected. [img]https://1.bp..com/-efn3Ig0zXF4/WYend5nEO5I/AAAAAAAAAKA/gN_ikklUJToYpYYF1fnr9j21bESFFRBigCLcBGAs/s400/virus_detect.jpg[/img] A PC organize, and in addition remains solitary frameworks, are vulnerable to various PC dangers. The harm caused by the dangers can make high misfortune the organization. The peril increments when the PC organizer is associated with the web. Despite the fact that there are diverse sorts of dangers to PC frameworks, they have a typical bond. They are intended to trap the client and access the system or the remain solitary frameworks or decimate the information. A portion of the dangers are known to duplicate itself, while others devastate the records on the framework or some contaminate the documents itself. Types of Computer Security Threats The classification of the types of information security threats is made on the way the information in the system is compromised upon. There are the passive threats and the active threats. The passive threats are very difficult to detect and equally difficult to prevent as well. Then there are the active threats. Since these threats continue to make changes to the system, they are easy to find out and fix as well. Virus: The most common of the types of cyber threats are the viruses. They infect different files on the computer network or on the stand alone systems. Most people fall prey to the viruses, as they trick the person into taking some action, like clicking on a malicious link, downloading a malicious file, etc. It is from these links and files, that the virus is transmitted to the computer. There are also cases of the viruses been a part of an email attachment, which may be downloaded from the internet. In some cases, the viruses can also spread through infected portable data storage as well. Hence, it is important to have an antivirus on the system, which can not only detect the virus but be able to get rid of them as well. Worms: The other common types of internet security threats are the worms. They are actually malicious programs, which take advantage of the weaknesses in the operating system. Like the worms in real life crawl to move from one place to another, similarly, the worms in the cyber world also spread from one computer to another and from one network to another. The most prominent feature of the worms is that they are able to spread at very high rates, which can lead the system being at risk of crashing. There is a type of worm, called net worm. These worms replicate itself by sending complete and independent copies of itself over a network, thereby infecting almost all the systems on the said network. Trojan: This is a different type of computer virus, which is disguised under the garbs of a friend. The Trojans derive their name from the legend. They make their way into the software, which may not be noticed. It is often seen, that the Trojans are a part of the different attachments in emails or download links. In some cases making a visit to certain web pages also puts the computer system at risk. Spyware: Spyware as the name suggests spy on the network and the computer system. They may be downloaded unintentionally from different websites, email messages or instant messages. In some cases, they may also make their way through different direct file sharing connection. In some cases, clicking on 'Accept User License Agreement', can also put the computer at risk. Rootkits: The job of the rootkits is to give cover to the hackers. The best or the worst part about rootkits is that they are able to hide from the antivirus software as well, due to which the user is not aware that a rootkit is present on the system. This helps the hacker and he is able to spread malware on the system. Therefore, it is important that one opts for antivirus, which also has a rootkit scanner, which will be able to detect the invasion. Riskware: They are dangerous applications, who often become a part of software applications. They are often seen as a part of development environment for malicious programs and spread to the software applications. In some cases, these applications can also be used by hackers as additional components to gain access to the network. Adware: The recent addition to the list of computer threats are the adware. They are actually advertising supported software. It is not uncommon to see different advertisements or pop ups coming up on the computer when certain applications are being used. They may not pose a lot of threat, but often lower the speed of the computers. There are chances that the computer system may become unstable because of this adware. Cookies: When we visit a website, there are files due to which the website is able to remember the details of the computer. They are more of a threat to confidentiality as opposed to the data on the computer. In most cases, cookies may be stored on the computer without the consent of the user and data may be stored on them, which is passed back to the website server the next time, one visits the website. The data gathered may be sold to third parties and depending on the interests, which may lead to different advertisements flashing on the screen. Phishing: Often people appear to get emails from trustworthy organizations, like banks. In some cases, the emails may come from bogus sites, which may resemble the original site or it may superimpose a bogus pop-up, due to which confidential data is gathered. They are often a part of different scamming activities and often poses to the financial threats. These were the main types of computer threats. It is important to be on the look always to ensure that the network and/or standalone systems are protected from the threats. As soon as any of the threats are detected, measures will have to be taken to get rid of them at the earliest, so that the data is protected. Source: http://www.sundylinks.com/2017/08/computer-threats-you-should-be-aware-of.html |
(1) (Reply)
Convert Airtime To Cash Here / Cheap Brand New Laptops For Sell / .
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 26 |