Thursday, July 2, 2009

The threat of online security: How safe is our data?

With the advanced technology today, almost every people know about the Internet. The Internet has become the critical medium, powering a growing list of revenue-generating business activities from e-commerce and e-supply chain management to online marketplaces and collaboration, people rely on computers to create, store and manage critical information. However, this developed technology sarcastically increase the risk every computer user faced, they bring many threats to e-commerce, let us discuss some of it.

(i) Viruses
Viruses are the most common form of malicious code attacks. Computer viruses is a piece of software code that replicates itself into a host which including the operating systems to spread over and harm the user’s computer. In the internet world, there have around 80,000 viruses and everyday will have 25 new viruses be created. The examples of computer viruses are Melissa virus Melissa" virus/worm of 1999, which caused about $80 million in damages worldwide, The May 2000 "I LOVE YOU" virus was even simpler -- a small piece of code attached to electronic mail. Double-clicking on the executable caused it to send an e-mail to everyone in an address book, subsequently damaging victims' machines. Fast-spreading viruses like "I LOVE YOU" cause e-mail servers to overload and businesses to shut down email correspondence. For example, in one day, the "I LOVE YOU" virus caused over $100 million in United States damages and over $1 billion in worldwide losses.

(ii) Phishing

Phishing is a scam in which a criminal sends an official looking e-mail that attempts to obtain your personal information and financial information such as credit card numbers, password, account data. For example, might send millions of fraudulent e-mail messages that appear to come from Web sites you trust, like your bank or credit card Company, and request that you provide personal information. As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up window.
They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. The following is an example of what a phishing scam e-mail message might look like.


(iii) Online Fraud
Online fraud most covering Internet transactions that involve falsified information. The most popular is identity theft. Criminal fraudulently uses someone else's identity. The criminals may steal mail from your letterbox; use your identity to gain access to your bank account or other financial services, or to get credit such as a home loan, personal loan or credit card in your name. For example, in January 2001, the entire municipality of Largo, Florida lost e-mail service for over a week when an unknown company based in Spain compromised its identity. The company hacked into the city's e-mail relay system to steal the Largo.com identity. Soon enough, e-mail spam seemingly from Largo.com addresses flooded the net, and many Internet Service Providers blacklisted all incoming and outgoing electronic messages from the city.


(iv) Accidental Actions

Accidental actions contribute to a large number of computer security risks. This category encompasses problems arising from basic lack of knowledge about online security concepts and includes issues such as poor password choices, accidental or erroneous business transactions, accidental disclosure, and erroneous or outdated software. Related problems occur as a result of non recognition security products and information leakage resulting from insecure information transfers. Education and prudence should be considered key defenses in limiting the frequency and extent of such events, since this form of cyber vulnerability is largely self-inflicted and avoidable.

(V) Spam
Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. Email spams typically cost users money out-of-pocket to receive. Many people - anyone with measured phone service - read or receive their mail while the meter is running, so to speak. Spam costs them additional money. On top of that, it costs money for ISPs and online services to transmit spam, and these costs are transmitted directly to subscribers.


(vi) Trojan

A Trojan enters your computer undetected, giving whoever planted the Trojan unrestricted access to the data stored on your computer. Trojans can transmit credit card information and other confidential data even if you're not accessing that data at the time. Trojans can be sent either as an email, spam mail, attachment, or embedded in a web page


(vii) Worms

A worm is a computer programme that has the ability to copy itself from machine to machine. Worms normally move around and infect other machines through computer networks. Using a network, a worm can expand incredibly quickly.




In the conclusion, risk faced by computer users is increasing with the increasing developed technology, threaten the safety of the data .A brief write-up here about some of the threat of online security hope can raise some awareness to the users and take necessary precaution to enhance the defenses against online security threats.



No comments:

Post a Comment