Ironically, as the society becomes more and more technologically savvy, the risks of infringement of confidentiality and security of data increase as well. With internet being a medium which connects people from every nook and cranny of the world, it poses a great threat that jeopardizes the online security of data.
Cyber attacks fall under several categories: (1) Accidental Actions; (2) Malicious Attacks; (3) Natural disasters.
(1) Accidental Actions
Accidental actions includes matters such as setting poor passwords, accidental or incorrect business transactions, accidental disclosure of confidential information, outdated software which is easily trespassed by intruders as well as theft or misplace of notebooks which give rise to intruders to access to company’s data.
The root of causing these unintentional acts is attributed to the deficiency of basic knowledge about online security concepts which then result in using security products which are not configured properly. An incorrectly configured web server can allow even an unsophisticated hacker to access files and directories on the web server that should not be accessible. Ultimately, it leads to leakage of important information to outsiders due to insecure information transfers.
(2) Malicious Attacks
These are attacks which are aimed to do harm by breaking through the security defense created by the organization or individuals. The most common threats which internet users face nowadays are cybercrime, hacking, phishing and network attacks.
(a)Cybercrime & Hacking

Hackers can easily learn about the targeted company’s web-based applications and discover its

(b)Phishing

(c) Network Attacks
Several forms of malicious-logic program are virus, Trojan Horse, computer worm, Denial of

A Trojan Horse is a program that secretly hides within or looks like a legitimate program giving people the impression that it is harmless. However, one may realize that it actually will do harm to one’s computer and data files when it is triggered with certain conditions satisfied.
Distributed Denial of Service attacks (DDOS) attack a web server by overwhelming

(3) Natural disasters

Natural disasters also pose a threat to online security. Natural disasters such as fire, flood, earthquake which occurrence at the place where server and database hardware are located can cause data stored to be destroyed or lost. Hence, a comprehensive disaster recovery plan should be in place before any unpleasing event happens.
Related links:-
Computer Security Ethics and Privacy
Top Online Security Threats for 2009
Computer Security, Viruses and Threats
2 comments:
Hi,
I find your post about threats of online security is quite informative, but I would like to add another form of malicious software, which is “worms”. Worms are actually more powerful than viruses and it is capable of cloning itself without any execution of programs or systems. Generally, the existence of worms in a computer will slow down the computer speed and it brings harmful effects to the files in a computer.
Hence, computer users should also be aware of such attack and actively search for solutions to prevent it.
Cheers.
Thank you for the good point. Sorry that we have overlooked that point in writing our post. =)
Post a Comment