Categories
Data Processing Notes

Internet security

Internet security is a branch of computer  security, Its objective is to establish rules and measures to use against attacks over the Internet. [1]The Internet represents an insecure channel for exchanging information leading to a high risk of intrusionor fraud, such as phishing.

Malware

Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency.

A botnet

A botnet is a network of zombie  computersthat have been taken over by a robot or bot that performs large-scale malicious acts for the creator of the botnet.

Computer Viruses

Computer Viruses are programs that can replicate their structures or effects by infecting other files or structures on a computer. The common use of a virus is to take over a computer to steal data.

*. Computer worms

*. Computer worms are programs that can replicate themselves throughout a computer network, performing malicious tasks throughout.

*. Ransomware

*. Ransomware is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.

*. Spyware

*. Spyware refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user’s consent.

*.A Trojan horse

*.A Trojan horse, commonly known as aTrojan, is a general term for malicious software that pretends to be harmless, so that a user willingly allows it to be downloaded onto the computer.

Denial-of-service attacks

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users.

Phishing

Phishing occurs when the attacker pretends to be a trustworthy entity, either via email or web page. Victims are directed to fake web pages, which are dressed to look legitimate, via spoof emails, instant messenger/social media or other avenues. Often tactics such as email spoofingare used to make emails appear to be from legitimate senders

Application Vulnerability

Applications used to access Internet resources may contain security vulnerabilities such as memory safety bugs or flawed authentication checks. The most severe of these bugs can give network attackers full control over the computer.

Click here to ask a question and get an answer published in the forum. Read our disclaimer.

Get paid for every topic you create in: Shoutam.com Forum!MAKE-MONEY

Discover more from StopLearn

Subscribe now to keep reading and get access to the full archive.

Continue reading