Nowadays, new generations are depending on the technology. Private photos and information are all save in their own computers. It makes life easy but also make them more risky. Their data could be stolen easily!
Cases such as Phishing e-mail targets local Internet banking users, Edison Chen Photo Scandal, Company Laptop been Stolen and School Employees' Personal Data Stolen. These cases reflects that data could be stolen by different ways such as data theft, phishing and laptop stolen.
There are types of threats and attacks that are harmful to our data.
Cases such as Phishing e-mail targets local Internet banking users, Edison Chen Photo Scandal, Company Laptop been Stolen and School Employees' Personal Data Stolen. These cases reflects that data could be stolen by different ways such as data theft, phishing and laptop stolen.
There are types of threats and attacks that are harmful to our data.
1. Nontechnical attack -- phishing.
Details are available in http://t8g3.blogspot.com/2009/06/phishing-examples-and-its-prevention.html which posted by Kok Yong.
2. Technical attacks-- DoS attack, DDoS attack, Virus, Worm, Macro virus or macro worm and Trojan horse.
Denial-of-service attack
An attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources. It may cuase a network to shut down, making it impossibke for users to access the site.
Virus
A piece of software code that insert itself into a host, including the operating systems, to propagate, it requires that its host program to be run to activate it.
Trojan Horse
A program that appears to have a useful function but taht contains a hidden function that presents a secuirty risk.
Beware of these threats and attacks as they are harmful to your data!
No comments:
Post a Comment