Threats To Computer System & Control Measures
Threats To Computer System & Control Measures
Concept of Threat
Virus
Malicious computer programs that are often sent as an email
attachment or a download with the intent of infecting your
computer, as well as the computers of everyone in your contact
list. Just visiting a site can start an automatic download of a
virus.
When a program is running, the virus attached to it could
infiltrate your hard drive and also spread to USB keys and
external hard drives. Any attachment you create using this
program and send to someone else could also infect them with
the virus.
The homepage you set on your web browser is different (note
that this could be caused by Adware that has been installed on
your computer).
Programs are running without your control.
If you suspect a problem, make sure your security software is up
to date and run it to check for infection. If nothing is found, or if
you are unsure of what to do, seek technical help.
Hacking
Hacking is a term used to describe actions taken by someone to
gain unauthorized access to a computer. The availability of
information online on the tools, techniques, and malware makes
it easier for even non-technical people to undertake malicious
activities.
The process by which cyber criminals gain access to your
computer.
Find weaknesses (or pre-existing bugs) in your security settings
and exploit them in order to access your information.
Install a Trojan horse, providing a back door for hackers to enter
and search for your information.
Phishing
Spyware
Spam
Firewall