Sunday, June 21, 2009

The threats of online security


















One of the biggest challenges on the Internet today is the online security threats. This is because of the internet attacks are increasing in number and complexity, therefore, everyone will get the risk when online. Besides that, every person who owns a computer with internet connection is competent to train themselves with ‘hacking’ knowledge by making a number of researches online. Moreover, Internet is also providing the opportunities for users to share the knowledge without filtering the content. However, everybody can learn the skills that may endanger online security through internet as raise the online security risk.

Since users are rely on computers to create, manage and store important information, thus
, users need to know that computer security is actually playing the most important role in protecting their data from misuse, damage, steal and loss. Consequently, the best way that user can do is to use security software and hardware such as firewalls and authentication servers to protect their computer and personal information as they get on the Internet.

In addition, the reason of user need to learn how to protect their computer is because of everyday there will be new viruses and security threats launched all over the Internet, which means user need programs that can be updated continuously and don’t just only focus on a specific type problem.


The followings are some of the potential online security threats that can be found.


1.Instant messaging

It is a general enough means of communication tool and it also a way to attack one’s system by hackers. However, user need to learn how to configure the instant messaging services correctly so that user can have comprehensive control over any file transfer that can take place by the way of instant messaging can easily prevent this.


2.Spyware Attacks

The most common online security threat faced by Internet users is spyware attacks. This is because spyware attacks are a computer program which is designed to embezzle other user’s information and data. In general, spyware attack is software that needs to be installed in one’s computer without his/her realization. Therefore, after the complete installation of the software into the computer, it will automatically send user’s personal information such as documents, passwords, credit card numbers, bank accounts and other private information to another person.

Those familiar spyware are Trojan Horses, Key Loggers, Dialers and Adware Programs. However, user need to install trusted anti spyware programs to protect user’s computer from spyware. Besides that, one of advice for those users is don’t simply download software that never ever heard of as well as stick the name that you know.









3.File sharing applications

Nowadays, most of computer users are used file sharing applications to share files. This is because the easy way to share files between computer users is peer to peer file sharing. The information can be shared is because it is use a network to link the computers to one another. But there is a potential problem which is let the hackers easy to take this chance to access and even download files from any computer on the network. So that, most of expert advice user that it basically is not a good idea by using peer to peer program to share files.


4. Password Protection
Passwords are definitely a huge part of your online security. You'll discover that approximately each website that you visit is deal with online transactions, emailing, and shopping use passwords to validate who you are. Thus, it indicates that each user not only requires choosing a password and the password must not so easily to figure out. Furthermore, user shouldn’t share it with other else and must keep it as safely and securely. Consequently, users are advice not to use the similar password for all of accounts and try to come up with a password that contains letters, numbers, and special characters.













5. Web servers and services



A lot of default HTTP web servers able to expose visitors every time when they log on to these websites is because of there are many patches have been liberated over the previously years. However user need to confirm that all the patches are up-to-date and didn’t use the default configuration or application. This is because of these vulnerabilities may lead to denial-of-service attacks and other types of threats.

6. Mail client
Most of the hackers are use email to spread overwhelming viruses and worms to destroy user’s computer system. This is because all those viruses and worms will create multiple files and affect the user’s computer run slowly. These viruses and worms will include into the attachments of emails. However, this is can be prevented and limited by configuring those mail servers correctly so that user can block those doubtful attachments or files.

In order to protect the system, there are some ways that can deal with the threat of security online.

1. Firewalls

Install the firewalls are a protective barriers between user’s computer and underlying harmful attacks by hackers or offensive websites. Moreover, firewalls also can prevent the intrusion by restricting the network traffic passing through it and denies or allows passage based on a set of rules.

2. Anti-virus software

However install anti-virus software is one of the way to protect computer by reduce computer viruses and other malicious code that come through email and other else. Therefore, good anti-virus software will automatically update itself on a regular basis and they can identify the new threats on the Internet.

3. Get the latest security updates and patches

Users must keep the security and system patches up-to-date because there will have a helpful information about vulnerabilities in programs and how to find the fixes. In additional, user must turn on window’s automatic-update function to get Microsoft’s regular security patches.


4. Read the password advice

Carefully read the password advice and keep them safe because passwords are the key to user’s online account information.

5. Honey pots

It is an intentionally or unintentionally left vulnerable to attacks user’s computer by crackers. Therefore, user need pay more attention to the messages that pop up on the screen from the Window’s, especially in the new Vista operating system. Thus, user is advice to don’t click on any unknown links in the social network messages from unknown user.


As a conclusion, risk uncovered by computer users is rising as the rising developed technology. So that, safeguard must always develop up to date to improve the defenses against online security threats. Hence, users must be learn about the important damages and loss caused by imposing security threat. In addition, user needs to have a good backup method to keep their data and files.






Sources from:

4 comments:

Gpy-glowworm said...

wah now only i know so many threats of online security..

Fanny Chua said...

ya..there are so many online security threats but user still can avoid it by install antivirus.

katherinemerry said...

You can use this cheap service for write my college paper. Really appreciate this wonderful post that you have provided for us.Great site and a great topic as well i really get amazed to read this. Its really good site able to provide you with the writing help you have been looking for also get result in any time.

Anonymous said...

The platform technology write for us seems like a valuable resource for tech enthusiasts looking to stay informed about the latest advancements and innovations.