Possible threats to the data stored in the system.

Data security is about keeping data safe. Many individuals, small businesses and major companies rely heavily on their computer systems.
If the data on these computer systems is damaged, lost, or stolen, it can lead to disaster.
Key threats to data security
Data may get:
·         lost or damaged during a system crash - especially one affecting hardisk.
·         corrupted as a result of faulty disks, disk drives, or power failures.
·         lost by accidentally deleting or overwriting files.
·         lost or become corrupted by Computer Viruses
·         Hacked onto by unauthorised users and deleted or altered.
·         destroyed by natural disasters, acts of terrorism, or war.
·         deleted or altered by employees wishing to make money or take revenge on their employer.
 
Keeping data secure
Measures that can be taken to keep data secure include:
 Making regular backups of files (backup copies should be stored in fireproof safes or in another building)
·         protecting yourself against viruses by running anti-virus software
·         using a system of passwords so that access to data is restricted
·         safe storage of important files stored on removable disks, eg locked away in a fireproof and waterproof safe
·         allowing only authorised staff into certain computer areas, eg by controlling entry to these areas by means of ID cards or magnetic swipe cards
·         always logging off or turning terminals off and if possible locking them
·         avoiding accidental deletion of files by write-protecting disks
·         using data encryption techniques to code data so that it makes no apparent sense



Hackers
Unless they are protected, computer systems are vulnerable to anyone who wants to edit, copy or delete files without the owner’s permission. Such individuals are usually called hackers.

Malware
malwareMalware, short for malicious software, is software designed to gain access to a computer system without the owner's consent. The expression is a general term used by the computer industry to mean a variety of forms of hostile, intrusive, or annoying software. These things are sometimes, incorrectly, referred to as a computer virus.
Software is considered malware based on the perceived intent of the creator rather than any particular features.
Malware is not the same as defective software, that is, software that has a legitimate purpose but contains harmful bugs.

Virus
virusA computer virus is a piece of software that is designed to disrupt or stop the normal working of a computer. They are called viruses because like a biological virus, they are passed on from one infected machine to another. Downloading software from the Internet, attachments to emails or using USB memory sticks are the most common ways of a virus infecting your computer.




Worms
A computer worm is a self-replicating program. It uses a computer network to send copies of itself to computers on the network and it may do so without any user intervention. It is able to do this because of security weaknesses on the target computer. Unlike a virus it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth whereas viruses almost always corrupt or modify files on a targeted computer.

Trojan Horses
Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.
Spyware
spySpyware is a type of malware that is installed on computer and collects little bits of information at a time about users without their knowledge. It can be very difficult for a user to tell if spyware is present on a computer. Sometimes, however, spywares such as key loggers are installed by a company, or on a public computer such as in a library in order to secretly monitor other users.

While the term spyware suggests that software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. Spyware is also known more formally as privacy-invasive software.

Adware
Adware, or advertising-supported software, is any software package that automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Common forms of this type of malware are on websites where popup windows appear when you land on the website. Some types of adware are also spyware.

Crimeware
Crimeware is a class of malware designed specifically to automate cybercrime. Its purpose is to carry out identity theft. It is most often targeted at financial services companies such as banks online retailers etc. for the purpose of taking funds from those accounts or making unauthorized transactions to benefit the thief controlling the crimeware.


SPAMspam
Spam is the abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam web search engine spam and social networking spam for example.







phishingPhishing
Phishing is an e-mail fraud method in which the criminal sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well-known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN and Yahoo. A phishing expedition, like the fishing expedition it's named after, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter it, take the bait.
The criminal could then use the information to take money from the persons account for example.

No comments:

Post a Comment