
The main online security threats include the following:
1. Online Fraud

(a) Internet banking fraud 
Internet banking fraud is fraud or theft committed using online technology to illegally remove money from, or transfer it to, a different bank account. Phishing is an activity that facilitates Internet Banking Fraud.

Internet banking fraud is fraud or theft committed using online technology to illegally remove money from, or transfer it to, a different bank account. Phishing is an activity that facilitates Internet Banking Fraud.
(b) Phishing

(c) Identity and Data TheftIdentity and data theft is where the thief obtaining the information illegally, searching for personal information and records. Often they will look for information such as full name, social security number, passwords, credit card numbers and etc. Then they will use this information to gain access to bank accounts or other protected areas, and also unauthorized manipulation of private data such as sold them out.
2. Malicious Attacks
This is the attack that specifically aim to do harm, it also known as premeditated attack. They can be further broken down into attacks caused by malicious code and those caused by intentional misrepresentation. Malicious code, on the other hand, is at the root of so-called "crackings" and "hackings" - notable examples of which include computer viruses, data theft, and Denial of Service (DOS) attacks.

(a) Computer Viruses
The most common form of malicious code is computer virus -- a program or a fragment of code that replicates by attaching copies of itself to other programs. There are four main c

1. File infectors, which imbed themselves into ordinary executable files and attach to other system executables when the file is run.
2. System or boot-record infectors, which infect the first sector on a driver from which the operating system is booted-up. These viruses are not as prevalent now that floppy disks are less frequently used.
3. Macro viruses, which infect data files that include scripting "macros."
4. Multi-part, which use more than one attack method viruses.
(b) Denial of Service Attacks
It is another form of malicious code, are carefully crafted and executed. DOS are not new, yet they are growing in sophistication. Traditional DOS attacks usually involve one computer attacking another, but the use of multiple computers in a highly organized attack is becoming increasingly common. Such attacks, known as Distributed Denial of Service attacks (DDOS).
3. Macro viruses, which infect data files that include scripting "macros."
4. Multi-part, which use more than one attack method viruses.
(b) Denial of Service Attacks

It is another form of malicious code, are carefully crafted and executed. DOS are not new, yet they are growing in sophistication. Traditional DOS attacks usually involve one computer attacking another, but the use of multiple computers in a highly organized attack is becoming increasingly common. Such attacks, known as Distributed Denial of Service attacks (DDOS).
Education and prudence should be considered key defences in limiting the frequency and extent of online security issue, since most cyber vulnerabilities are largely self-inflicted and avoidable. As prevent is better than cure, it is important that consumers and organizations avail themselves of appropriate computer security tools, which serve to prevent many such interceptions.
"Stop the threat before it becomes a problem"
http://www.maybank2u.com.my/online_security_watch/five_tips.shtml
http://www.logicaltips.com/LPMFrame.asp?CMD=DeptArticles&ID=13&AS=I
http://news.bbc.co.uk/2/hi/technology/6998068.stm
http://www.crime-research.org/articles/Internet_fraud_0405/
References:
By Jian Yi (^-^)`
2 comments:
Yerr, it's sound kinda scary and unsafe on the network, as if i just seen a horror movie after reading this post ;P Haha, anyway, i think it's true that there is quite numbers of online security issues existing in the cyberspace(wow this world sound techky man :P ) Prevention is always better than cure as Jian Yi has mentioned in the post, i affirm the truth of that as well.. Get your computer equipped with security softwares and tools, don't visit malicious websites such as porno sites and so on, haha now sound like i'm an IT consultant. Hey dude, by the way, are you using AVG? haha, just wonder why you chosed to put the AVG commercial instead of others, haha, pls forgive my curiosity, you may ignore that question.. Thanks for the sharing, see ya
Haha, you are 'zun' man, other than that video i wonder what makes you know i'm using AVG :P Actually AVG software is quite good, but it'll be better protected if you buy the genuine software which includes more protection instead of the very basic Free AVG. Haha, sound as if i'm helping AVG to advertise their product ;D Thanks for your feedback.
Post a Comment