Internet Security Threats : Hacking
The Net
Click thumbnail to view full-sizeOnline System Threats
Some of the threats faced by online systems that use the internet on a regular basis are as follows:
- Intrusion or Hacking
- Viruses and Worms
- Trojan Horse
- Spoofing
- Sniffing
- Denial of Service
Details about hacking and intrusion into your computer systems is given as follows:
For information about Spoofing, click here: Spoofing
Hacking..
The purpose of gaining access to a person's computer without the knowledge of the user is know as hacking and the people who do this are known as hackers...
Once a hacker had managed to get access to your system, they can do practically anything they want to on your system, they can either alter the data available on your system o even steal private information like your Social Security Number, personal information and even sensitive information such as your bank account information, credit or debit card information and even your passwords...
Hackers tend to mostly target systems like eCommerce websites and financial websites that provide the facility for online banking.Then again it depends on each hacker and their choices..
Some people hack just outta curiosity and for the fun and heck of it.. in order to hack into a system a hacker has to crawl on to the targeted system and gather information about it's strengths and weakness, what kind of operating system is being used, unsecured folders in the system, configurations files, etc..
They gather all this data, analyse it to see how the website or system can be best comprised and once they've found their loophole into the system, they try and exploit the system.
A Trojan horse is a virus program created and used by many hackers to gain access and intrude in to a system.
Some of the loopholes that hackers find or look for are:
- Poor Implementation of Shopping Carts
- Hidden fields in the HTML forms
- Client-side validation scripts
- Direct SQL attack i.e the database
- Session Hijacking
- Buffer Overflow Forms, etc..
Preventive and remedial measures that can be taken:
Most eCommerce websites and even individual users have started using firewalls systems in order to prevent their systems from such cyber attacks..When a hacker tried to penetrate the firewall and attack your system, the firewall system immediately reports the attack and sometimes even helps in tracking the attack. But as time progresses hackers are now able to penetrate firewall systems so it's a good idea to conduct regular vulnerability tests and updation of your firewall system.
Some Stuff You Might Like :
- Internet Security Threats : Spoofing
Our lifes now-a-days is run entirely by the internet...But how secure is the net? - How to Design a Successful Website
Let's face it..everyone wants to be a part of the Internet and have a website about their company out there.. So here are a few basic principle's, do's and do not's that one should follow... - How to Use Simple HTML Programming to Make a Link
Need to create Hyperlinks to connect one page to another in your Website or links within the same page or maybe even to link two Websites to each other? Wanna learn how to use images as links aswell?
© 2013 Paiva