Monday 20 August 2012

Internet Security

By Karen Carter


Over last three decades, the internet has become a very risky means of communication in all sectors of daily life. It starts from very familiar virus attacks and now its approach to hacking, and spam attack are alarming and increasing day by day. The Drug and Crime Prevention Committee Report (2004) submitted to the Parliament of Victoria, Australia stated that 79% breach to their e-commerce system would most likely occur via the Internet or other external accesses.

Often times hackers can be as young as a teenager who is just trying to be popular in front of his friends and causing harm to your computer system. Because of the threat of hackers, people should be very cautious when giving out any personal information online.

Internet security can be breached by different types of malicious software. Malware is a type of virus that forces itself into your computer system in the form of viruses, Trojan horses and worms. Viruses are usually simple programs that replicate their structure by infecting files on a computer system. Trojan horses pretend to be something harmless so the user is tricked into thinking that they are downloading something safe. This is how it gets into the system and infects it.

There are some different types of malicious programs that can cause a breach in internet security. Malware can cause viruses in the computer. Things like Trojan horses and worms will automatically download software on your computer, sometimes defective. Viruses are programs that infect files and such on your computer. A Trojan horse can fool a user into thinking it is something else so the user downloads it not realizing it is a virus.

There are several ways to improve internet security. A strong policy that lists what the responsibilities are when it comes to surfing the web should be enforced in all businesses. Anti-virus software should be installed on networks and computers to protect your system. Firewalls can be set up between two Another way is digital signature, which is used to encrypt data between locations or across the web.




About the Author:



No comments:

Post a Comment